Thursday, November 28, 2019
How the past influences the present in the novel The Reader and the play A Streetcar Named Desire Essay Example
How the past influences the present in the novel The Reader and the play A Streetcar Named Desire? Essay The two works of literature discussed in this essay have several similarities in their underlying themes and narratives. The Street Car Named Desire, written by Tennessee Williams in 1947, was not only well received by critics, but also adapted into several stage productions. The post Second World War period in which the play is set was a period of rapid social transformation. The United States had emerged as one of two superpowers and there is unprecedented growth in the manufacturing industry. This alters the conventional equations of power between men and women, cities and country sides, northern states and southern states, etc. It is in this shifting and evolving milieu that the lives of Stanley Kowalski and Blanche DuBois cross paths, which ultimately leads to much interpersonal turmoil. Similarly, the novel ââ¬ËThe Readerââ¬â¢ written by Bernhard Schlink is a work of high literary standard. The movie version too got several nominations in the Academy Awards. The R eader too is set in period of the Second World War, although its narrative finally takes us to the end of the century. While the particular contextual settings in which lead protagonists Hanna and Michael Berg develop their relationship is different from that of Stanley and Blanche, one could see strong parallels between the two stories. This essay will foray further into such relationships and ascertain how the present lives of both Blanche and Michael have been influenced by past due to them mainly keeping and finding out secrets. In The Streetcar Named Desire, the lead character of Blanche DuBoisââ¬â¢s interactions with Stanley, Stella and Mitch are all defined and shaped by her troublesome past. Early in her youth, she falls in love with and marries a gentleman in Laurel, Mississippi. But the romance and happiness was short-lived as she soon discovers that her husband is homosexual, who subsequently kills himself. This tragic end to a whirlwind marriage had left a deep scar in Blancheââ¬â¢s psyche, making her prone to flights of fantasy and illusions of grandeur. Throughout the play, Blanche is show as being obsessively concerned about her looks, clothes and jewellery. This behaviour is partly due to feelings of insecurity as a result of aging. But more importantly the luxurious lifestyle with which she was accustomed to in Laurel, as well as the fairytale marriage to Allan, ended in disaster. While the reason for Allanââ¬â¢s suicide is revealed to Mitch, the details pertaining to the loss of their ancestral mansion is told to Stanley, when the latter coerces her to divulge the same. In many ways, the behaviour of Blanche since her arrival at Stellaââ¬â¢s home is an attempt to recompense for these losses. This manifests itself as a form of neurosis as she becomes obsessed about her looks and appeals to the opposite sex. Beneath the veneer of refinement and culture, she desperately craves for intimacy from every possible source. Even a young salesman who comes to the door is taken advantage of by Blanche. Hence, Blancheââ¬â¢s abnormal behaviour is very much rooted in her past. We will write a custom essay sample on How the past influences the present in the novel The Reader and the play A Streetcar Named Desire? specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on How the past influences the present in the novel The Reader and the play A Streetcar Named Desire? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on How the past influences the present in the novel The Reader and the play A Streetcar Named Desire? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In the case of The Reader too, the later narrative of Michael is full of remorse and guilt for his ignorance in the past. When evaluating the novel, one has to study it in the context of the burgeoning body of holocaust literature that has been published in the last sixty years. Rather than dealing in dichotomies of good and evil in the characters of Hanna and Michael, Bernhard Schlink does present a nuanced view of the questions confronting an entire generation of Germans post holocaust. Michaelââ¬â¢s individual turmoil is only representative of this greater malaise. While the novel provides an entry point for further exploration of the moral aspects of the holocaust, it is simultaneously a statement on the limitations of the written word to convey and elicit comprehensive responses. To the extent that this is an accepted fact, not just applicable to the lead characters of The Reader, but for the Novel in general, the author does a satisfactory job of perceiving and probing answers to these tough questions. For example, the novelist does a satisfactory job in spelling out the internal monologues of Michael, as the latter comes to terms with his past. For instance, in one of the passages of the book, Michaelââ¬â¢s conscious thoughts were given expression by Schlink through the following words: ââ¬Å"She was too far away for me to read her expression. I didnââ¬â¢t jump to my feet and run to her. Questions raced through my head: why was she at the pool, did she want to be seen with me, did I want to be seen with her, why had we never met each other by accident, what should I do? (The Reader, p. 79) Such internal monologues do indeed show us the mechanisms with which Michael confronts his past and gives it perspective. In this way, in both The Reader and The Streetcar Named Desire, we see how the events and facts of the past play a crucial role in shaping the narratives of the present. Coming back to The Streetcar Named Desire, Blanche DuBois was so entrenched in the nostalgia and romance of her past that she refuses to recognize realities anymore. Her ideal notions of men, women and culture are markedly divorced from the rapid changes that have taken place in the country after the war. Seen from this viewpoint, Stanley comes across as a brutish and uncivilized bully who constantly harasses and exploits his wife Stella. This impels Blanche to advice Stella to leave Stanley and seek a new life for herself. She reminds Stella of finer enjoyments of life such as art, music and poetry and implores her to find a civilized man who would care about these things. But in reality though, it is Blanche who is holding on to a vision of the past that no longer exists. Her idealized view of romance, marriage and culture is so divergent from the new industrial realities of post war America, which is typified by the rugged masculinity displayed by Stanley. While Stanley mig ht lack social grace and politeness, he is honest to himself and others around him. But Blancheââ¬â¢s criticism of Stanley is a subconscious defence mechanism against her own illusions. By way of being critical of him she is retracting to an idyllic notion of the past. Strong parallels of this can also be found in the later realizations of Michael Berg. At the time of his adolescent affair with Hanna, he was unaware of her involvement in a concentration camp. Michael was also unaware that Hanna is illiterate, which is why she likes other people to read her stories. During the law trials that followed the holocaust, it was revealed that Hanna made her prisoners read to her, which is when Michael finally understands the truth. It could be argued that since Michael was young and vulnerable when he first met Hanna, he cannot be held responsible for the crimes she abetted. Moreover, he was not aware of all the facts at the time. But to understand Michaelââ¬â¢s enduring fascination and attachment to Hanna, one has to look at the initial circumstances in which they met. In the impressionable psyche of young Michael, the beauty and allure of Hanna would have made a lasting impression. To take the above mentioned assessment a little deeper, let u s take a specific example. Early in the narrative of the novel we come across this memorable piece of writing (the narrator is the young Michael Berg): ââ¬Å"As she was reaching for the other stocking, she paused, turning towards the door, and looked straight at me. I canââ¬â¢t describe what kind of look it wasââ¬âsurprised, sceptical, knowing or reproachful. I turned red. For a fraction of a second I stood there, my face burning. Then I couldnââ¬â¢t take it any moreâ⬠(The Reader, p. 12). It is moments such as these that reveal in depth the characters of Hanna and Michael. It also explains why Hanna continued to hold a power over Michael right up till her last days. But for some untold reason, Michael carries a burden of guilt about his relationship with Hanna. He could not shrug himself of this guilt even after the passage of many years. It is this strange and unarticulated attachment toward Hanna that prompts him to keep in touch with her during her time in prison. He sends her several books to read (albeit anonymously), knowing that she would get some solace from it. Later, toward the last days of her life, she hands over to Michael what little money sheââ¬â¢d saved up along with another cherished possession. There is, of course, one crucial difference between the development of Blanche and Michael. In the case of Blanche, with every passing day her insecurities seem to grow and her illusions of grandeur seem more absurd. In other words, her mental poise and sanity steadily withers away as she eventually becomes totally deluded and acts insane. Blanche resorts to greater amounts of liqueur and fantasy to console her of numerous fears. But in the case of Michael, as the narrative progresses, he seems to grow wiser with it. As the novel concludes with the death of Hanna and as Michael hands down her savings to an education fund, he seemed to have attained a closure on Hanna. Although the author does not explicitly state it, this final act from Michael gives him a sense of relief and peace. The very opposite is the case with Blanche, who becomes totally insane toward the end of the play, and is handed over to medical attention. Hence, the impact of the past on the present plays out i n distinctly different ways in the cases of Michael and Blanche. While Michael seems to benefit from the unravelling of past secrets, Blanche gets overwhelmed by them and ultimately succumbs to them. Works Cited: Bernhard Schlink, The Reader, translated by Carol Brown Janeway (London: Phoenix, paperback edition, 1998). Williams, Tennessee, A Streetcar Named Desire (play), first published in 1947.
Sunday, November 24, 2019
Proctor Gamble Project Essays
Proctor Gamble Project Essays Proctor Gamble Project Essay Proctor Gamble Project Essay The par or stated value of PGââ¬â¢s preferred stock is $1 B. )à à The par or stated value of PGââ¬â¢s common stock is $1 C. )à à . 975 D. )à In June of 2007 and 2006, 3,131,946 and 3,178,841 of common stock remain outstanding respectively. (p. 52) E. )à à ââ¬Å"Our first discretionary use of cash is dividend payments. Dividends per common share increased 11% to $1. 28 per share in 2007. This increase represents the 51st consecutive fiscal year the Company has increased its common share dividend. Total dividend payments to both common and preferred shareholders were $4. 2 billion, $3. 7 billion and $2. 7 billion in 2007, 2006 and 2005, respectively. â⬠(p. 48) F. )à à The rate of return on common stock equity in 2007, equals net income ($10.. 3 billion (converted to 103,000 for the sake of input in a calculator) less preferred dividends (41,797) divided by average common stockholders equity ((66,760 + 62,908)/2) which is 94%. The rate of return on common stock equity in 2006, (8,700,000-161,000/62,908) 135% G. )à The payout ratio for 2007 and 2006 was (Cash dividend divided by net income-preferred dividends (2007: 420,000/$103,000-41,797) is 6. 86. The payout ratio for 2006 (270,000/8,700,000-161,000) is 3. 16 H. )à The market price range of PGââ¬â¢s common stock during the quarter ended June 30, 2007 was $60. 76 to $64. 75 (p. 73)
Thursday, November 21, 2019
Use risk perception and risk communication perspective to evaluate the Essay
Use risk perception and risk communication perspective to evaluate the disaster management policy-making process - Essay Example Use risk perception and risk communication perspective to evaluate the disaster management policy-making process The earth has been found to be the only life-supporting planet for now. At least even if humans can live on other planets, it is the earth we all live on now.So if we are talking about keeping the earth intact and productive, then we should be thinking of ways of reducing; if not stopping disasters from occurring. The Assam Government Disaster Management Policy (2010) explains that ââ¬Å"disaster is a sudden, calamitous event bringing great damage, loss, and destruction and devastation to life and property.â⬠Sadly, the source continues to note that ââ¬Å"the damage caused by disasters is immeasurable and varies with the geographical location, climate and the type of the earth surface/degree of vulnerability.â⬠This explanation alone reechoes a very scaring situation whereby the fight against disaster must be embraced with all seriousness and urgency. Speaking of the need to fight disasters, the International Federation of Red Cross and Red Crescent Societies Disaster Man agement is quoted in World Confederation of Physical Therapy (2011) as pointing to disaster management as the most effective way of fighting disaster; explaining that ââ¬Å"disaster management is the organization and management of resources and responsibilities for dealing with all humanitarian aspects of emergencies, in particular preparedness, response and recovery in order to lessen the impact of disasters.â⬠... At the evaluation stage of policy making, policy makers are offered the opportunity to critically scrutinize the feasibility, achievability, effectiveness and usefulness of any given policy. Having noted this, it is important to appreciate the fact that for disaster management evaluation to go on successfully without any setbacks, there are a number of factors that need to be put in place and a number of mechanisms that need to be used by facilitators. Two of these factors and mechanisms are risk perception and risk communication perspective. These two elements come in best when utilized will ensure that the eventual implementation of disaster management policies achieve their needed results. To this end, this essay seeks to explore the use of risk perception and risk communication perspective to evaluate a given disaster management policy-making process. Literature Review Overview of disaster management policy making process and its importance Policy making process takes place day i n and out in different quarters of organizational set ups. Even at the national level, there are several policy making processes that take place day in and out. Policy making processes are necessitated when the need to have policies in place arise. Sycamnias (2008) states that ââ¬Å"according to a dictionary definition, policy is "any course of action followed primarily because it is expedient or advantages in a material sense."â⬠Without any question, disaster management is such an important phenomenon that it needs a whole policy formulation to get it underway. As part of the importance of taking disaster management through the policy making process, taking disaster
Wednesday, November 20, 2019
Comparison of Chinese and Japanese TV Essay Example | Topics and Well Written Essays - 1500 words
Comparison of Chinese and Japanese TV - Essay Example Programming content in Japan covers a variety of areas, with satellite channels also available. New programs are primarily broadcast during the mornings, while the evening hours are generally given over to romantic or other dramas and comedies, which are a staple of Japanese television, additionally, science fiction programs are also offered and anime or Japanese animation programs are very popular television programs, not only among the Japanese but also in other countries of the world. Variety shows are also offered such as skits, quiz contests musical performances and stunt shows. Television programming in China is controlled by the State which greatly limits the scope and extent of programming in China. For instance, state controlled television channels have been continually showing programs that remind the Chinese of the horrors that the Japanese inflicted upon them during the Second World War. (Vance, 2008). During this time, many thousands of Chinese people were killed by Japa nese raids in Nanjing and other cities in China, with individuals in China being tortured and executed. The continual flashing of these horrific images on Chinese television has kept the memories of these Japanese atrocities alive in Chinese minds and has à produced the rhetoric of hate in China. Chinese television shows programs and movies that so some degree or the other, relive the Japanese invasion into China and some of them are so powerful and graphic in their realistic images of brutality.
Monday, November 18, 2019
The Construction as a Revolutionised Industry Research Paper
The Construction as a Revolutionised Industry - Research Paper Example It is important to note that nations depend on their construction industry for their infrastructural developments making them quite important in facilitating national development. In this regard organisations offering construction work tend to be well regarded while certification requirements and procedures prove to be rigorous. In many countries like the US and UK among others, there are definite rules and oversight bodies set to regulate the actions of construction firms. This paper aims to consider the construction industry and its various facets in developing the premise that there is no single ideal organisation. PESTEL analysis of the construction industry Political/legal factors Government involvement entails the various interventions in regards to set laws and standards in the construction industry. As mentioned earlier governments have established regulations and standards for construction organisations to follow. Most of them are in regards to the safety and health of worke rs since construction entails risks that result in many accidents and fatalities in some cases (BIS 2011). In case of failure to adhere to them stiff remedial actions like fines are imposed after inspections or when an accident occurs. Taxation is another aspect where governments exert pressure in the construction industry. This is an industry whose taxation is high mostly due to their heavy-duty kind of work (Liebing 2001). The contracts also attract hefty sums of money which the governments are quite willing to tax. Regional Norms In regards to the European organisations the EU laws also affect how these construction firms operate. Regional trading blocks have become quite influential with time as the world becomes a global market place. EU, for example, aims at establishing common standards not only for the construction industry but to all (Dalby 1998). In this line, firms are being forced to follow alien laws that are not necessarily desirable for business.
Friday, November 15, 2019
Multi-Campus ICT Equipment Virtualization Architecture
Multi-Campus ICT Equipment Virtualization Architecture Multi-campus ICT equipment virtualization architectureà for cloud and NFV integrated service Abstract- We propose a virtualization architecture for multicampusà information and communication technology (ICT)à equipment with integrated cloud and NFV capabilities. Theà aim of this proposal is to migrate most of ICT equipment onà campus premises into cloud and NFV platforms. Adopting thisà architecture would make most of ICT services secure andà reliable and their disaster recovery (DR) economicallyà manageable. We also analyze a cost function and show cost advantages ofà this proposed architecture, describe implementation designà issues, and report a preliminary experimentation of NFV DRà transaction. This architecture would encourage academicà institutes to migrate their own ICT systems located on theirà premises into a cloud environments. Keywords; NFV, Data Center Migration, Disaster Recovery,à Multi-campus network I. INTRODUCTION There are many academic institutions that have multipleà campuses located in different cities. These institutions needà to provide information and communication technology (ICT)à services, such as E-learning services, equally for all studentsà on each campus. Usually, information technology (IT)à infrastructures, such as application servers, are deployed at aà main campus, and these servers are accessed by students onà each campus. For this purpose, each local area networkà (LAN) on each campus is connected to a main campus LANà via a virtual private network (VPN) over a wide areaà network (WAN). In addition, Internet access service isà provided to all students on the multi-campus environment. To access the Internet, security devices, such as firewalls andà intrusion detection systems (IDSs), are indispensable as theyà protect computing resources from malicious cyber activities. With the emergence of virtualization technologies suchà as the cloud computing[1] and network functionsà virtualization (NFV)[2], [3], we expected that ICTà infrastructures such as compute servers, storage devices, andà network equipment can be moved from campuses toà datacenters (DCs) economically. Some organizations haveà begun to move their ICT infrastructures from their ownà premises to outside DCs in order to improve security,à stability, and reliability. Also, there are a lot of contributionsà to archiving DR capabilities with cloud technologies [4], [5], [6]. Active-passive replication or active-active replication areà expected techniques that archive DR capabilities. In theseà replications, a redundant backup system is requiredà dedicatedly at a secondary site. With migration recovery [4],à these backup resources can be shared among many users.à These studies mainly focus on the application servers. While,à integrated DR capability for ICT infrastructures, bothà application and network infrastructures, are still immature.à We propose a multi-campus ICT equipment virtualizationà architecture for integrated cloud and NFV capabilities. Theà aim of this proposal is to migrate entire ICT infrastructuresà on campus premises into cloud and NFV platforms.à Adopting this architecture for multi-campus networks wouldà improve access link utilization, security device utilization,à network transmission delay, disaster tolerance, andà manageability at the same time.à We also analyze the cost function and show costà advantages of this proposed architecture.à To evaluate the feasibility of our proposed architecture,à we built a test bed on SINET5 (Science Informationà NETwork 5) [7], [8], [9]. We describe the test-bed design,à and preliminary experimentation on reducing the recoveryà time of VNF is reported. The rest of this paper is organized as follows. Section IIà shows background of this work. Section III shows proposedà multi-campus network virtualization architecture. Section IVà shows an evaluation of the proposed architecture in terms ofà cost advantages and implementation results. Section Và concludes the paper, and future work is discussedà II. BACKGROUND OF THIS WORK SINET5 is a Japanese academic backbone network forà about 850 research institutes and universities and provideà network services to about 30 million academic users.à SINET5 was wholly constructed and put into operation inà April 2016. SINET5 plays an important role in supporting aà wide range of research fields that need high-performanceà connectivity, such as high-energy physics, nuclear fusionà science, astronomy, geodesy, seismology, and computerà science. Figure 1 shows the SINET5 architecture. It providesà points of presence, called SINET-data centers (DCs), andà SINET DCs are deployed in each prefecture in Japan. Onà each SINET DC, an internet protocol (IP) router, MPLS-TPà system, and ROADM are deployed. The IP routerà accommodates access lines from research institutes andà universities. All Every pairs of internet protocol (IP) routersà are connected by a paier of MPLS-TP paths. These pathsà achieves low latency and high reliability. The IP routers andà MPLS-TP systems are connected by a 100-Gbps-basedà optical path. Therefore, data can be transmitted from aà SINET DC to another SINET DC in up to 100 Gbpsà throughput. In addition, users, who have 100 Gpbs accessà lines, can transmit data to other users in up to 100 Gbpsà throughput.à Currently, SINET5 provides a direct cloud connectionà service. In this service, commercial cloud providers connectà their data centers to the SINET5 with high-speed link such asà 10 Gbps link directly. Therefore, academic users can accessà cloud computing resources with very low latency and highà bandwidth via SINET5. Thus, academic users can receiveà high-performance computer communication betweenà campuses and cloud computing resources. Today, 17 cloudà service providers are directly connected to SINET5 and moreà than 70 universities have been using cloud resources directlyà via SINET5. To evaluate virtual technologies such as cloud computingà and NFV technologies, we constructed at test-bed platformà (shown as NFV platform in fig. 1) and will evaluate theà network delay effect for ICT service with this test bed. NFVà platform are constructed at four SINET-DCs on major citiesà in Japan: Sapporo, Tokyo, Osaka, and Fukuoka. At each site,à the facilities are composed of computing resources, such asà servers and storages, network resources, such as layer-2à switches, and controllers, such as NFV orchestrator, andà cloud controller. The layer-2 switch is connected to aà SINET5 router at the same site with high speed link,à 100Gbps. The cloud controller configures servers andà storages and NFV orchestrator configures the VNFs on NFVà platform. And user can setup and release VPNs betweenà universities, commercial clouds and NFV platformsà dynamically over SINET with on-demand controller. Thisà on-demand controller setup the router with NETCONFà interface. Also, this on-demand controller setup the VPN corelatedà with NFV platform with REST interface.à Today there are many universities which has multipleà campus deployed over wide area. In this multi-campusà university, many VPNs (VLANs), ex hundreds of VPNs, areà desired to be configured over SINET to extend inter-campusà LAN. In order to satisfy this demand, SINET starts newà VPN services, called virtual campus LAN service. With thisà service, layer 2 domains of multi-campus can be connectedà as like as layer 2 switch using preconfigured VLAN ragesà (ex. 1000-2000). III. PROPOSED MULTI-CAMPUS ICT EQUIPMENTà VIRTUALIZATION ARCHITECTURE In this section, the proposed architecture is described.à The architecture consists of two parts. First, we describe theà network architecture and clarify the issues with it. Next, aà NFV/cloud control architecture is described.à A. Proposed multi-campus network architectureà Multi-campus network architecture is shown in Figure 2.à There are two legacy network architectures and a proposedà network architecture. In legacy network architecture 1 (LA1),à Internet traffic for multiple campuses is delivered to a mainà campus (shown as a green line) and checked by securityà devices. After that, the internet traffic is distributed to eachà campus (shown as a blue line). ICT Applications, such as Elearningà services, are deployed in a main campus and accessà traffic to ICT application is carried by VPN over SINETà (shown as a blue line). In legacy network architecture 2à (LA2), the Internet access is different from LA1. Theà Internet access is directly delivered to each campus andà checked by security devices deployed at each campus. In theà proposed architecture (PA), the main ICT application isà moved from a main campus to an external NFV/cloud DC.à Thus, students on both main and sub-campuses can accessà ICT applications via VPN over SINET. Also, internet trafficà traverses via virtual network functions (VNFs), such asà virtual routers and virtual security devices, located atà NFV/cloud DCs. Internet traffic is checked in virtual securityà devices and delivered to each main/sub-campus via VPNà over SINET. There are pros and cons between these architectures.à Here, they are compared across five points: access linkà utilization, security device utilization, network transmissionà delay, disaster tolerance, and manageability.à (1) Access link utilization The cost of an access link from sub-campus to WAN isà same in LA1, LA2 and PA. While, the cost of an access linkà from a main campus to WAN of LA1 is larger than LA2 and PA because redundant traffic traverses through the link.à While, in PA, an additional access link from a NFV/cloudà DC to WAN is required. Thus, evaluating the total access linkà cost is important. In this evaluation, it is assumed thatà additional access links from NFV/cloud DCs to WAN areà shared among multiple academic institutions who use theà NFV/cloud platform and that the cost will be evaluatedà taking this sharing into account. (2) Security device utilization LA1 and PA is more efficient than LA2 because Internet traffic is concentrated in LA1 and PA and a statistically multiplexed traffic effect is expected.à In addition to it, in PA, the amount of physicalà computing resources can be suppressed because virtualà security devices share physical computing resources amongà multiple users. Therefore, the cost of virtual security devicesà for each user will be reduced. (3) Network transmission delay Network delay due to Internet traffic with LA1 is longerà than that with LA2 and PA because Internet traffic to subcampusesà is detoured and transits at the main campus in LA1,à however, in LA2, network delay of Internet to sub-campusesà is directly delivered from an Internet exchange point on aà WAN to the sub-campus, so delay is suppressed. In PA,à network delay can be suppressed because the NFV and cloudà data center can be selected and located near an Internetà access gateway on WAN. While, the network delay for ICT application servicesà will be longer in PA than it in LA1 and LA2. Therefore, theà effect of a longer network delay on the quality of ITà application services has to be evaluated.à (4) Disaster toleranceà Regarding Internet service, LA1 is less disaster tolerantà than LA2. In LA1, when a disaster occurs around the mainà campus and the network functions of the campus go down,à students on the other sub-campuses cannot access theà internet at this time. Regarding IT application service, IT services cannot beà accessed by students when a disaster occurs around the mainà campus or data center. While, in PA, NFV/cloud DC isà located in an environment robust against earthquakes andà flooding. Thus, robustness is improved compared with LA1à and LA2. Today, systems capable of disaster recovery (DR) areà mandatory for academic institutions. Therefore, serviceà disaster recovery functionality is required. In PA, back upà ICT infrastructures located at a secondary data center can beà shared with another user. Thus, no dedicated redundantà resources are required in steady state operation, so theà resource cost can be reduced. However, if VM migrationà cannot be fast enough to continue services, active-passive orà active-passive replication have to be adopted. Therefore,à reducing recovery time is required to adapt migrationà recovery to archive DR manageability more economicallyà (5) Manageability LA1 and PA is easier to manage than LA2. Becauseà security devices are concentrated at a site (a main campus orà NFV/cloud data center), the number of devices can beà reduced and improving manageability.à There are three issues to consider when adopting the PA.à Evaluating the access link cost of an NFV/cloudà data center. Evaluating the network delay effect for ICT services.à Evaluating the migration period for migrationà recovery replication. B. NFV and cloud control architectureà For the following two reasons, there is strong demand toà use legacy ICT systems continuously. Thus, legacy ICTà systems have to be moved to NFV/cloud DCs as virtualà application servers and virtual network functions. One reasonà is that institutions have developed their own legacy ICTà systems on their own premises with vender specific features.à The second reason is that an institutions work flows are notà easily changed, and the same usability for end users isà required. Therefore, their legacy ICT infrastructuresà deployed on a campus premises should be continuously usedà in the NFV/cloud environment. In the proposed multicampusà architecture, these application servers and networkà functions are controlled by using per-user orchestrators.à Figure 3 shows the proposed control architecture. Eachà institution deploys their ICT system on IaaS services. VMsà are created and deleted through the application interfaceà (API), which is provided by IaaS providers. Each institutionà sets up an NFV orchestrator, application orchestrator, andà management orchestrator on VMs. Both active and standbyà orchestrators are run in primary and secondary data centers,à respectively, and both active and standby orchestrators checkà the aliveness of each other. The NFV orchestrator creates theà VMs and installs the virtual network functions, such asà routers and virtual firewalls, and configures them. Theà application orchestrator installs the applications on VMs andà sets them up. The management orchestrator registers theseà applications and virtual network functions to monitoringà tools and saves the logs outputted from the IT serviceà applications and network functions. When an active data center suffers from disaster and theà active orchestrators go down, the standby orchestratorsà detect that the active orchestrators are down. They startà establishing the virtual network functions and applicationà and management functions. After that, the VPN is connectedà to the secondary data center being co-operated with the VPNà controller of WAN. In this architecture, each institution can select NFVà orchestrators that support a users legacy systems.à IV. EVALUATION OF PROPOSED NETWORK ARCHITECTURE This section details an evaluation of the access link costà of proposed network architecture. Also, the test-bedà configuration is introduced, and an evaluation of theà migration period for migration recovery is shown.à A. Access link cost of NFV/cloud data centerà In this sub-section, an evaluation of the access link costà of PA compared with LA1 is described.à First, the network cost is defined as follows.à There is an institution, u, that has a main campus and nuà sub-campuses. The traffic amount of institution u is defined as followsà different sites can be connected between a user site and cloudà sites by a SINET VPLS (Fig. 7). This VPLS can be dynamically established by a portal that uses the RESTà interface for the on-demand controller. For upper-layerà services such as Web-based services, virtual networkà appliances, such as virtual routers, virtual firewalls, andà virtual load balancers, are created in servers through theà NFV orchestrater. DR capabilities for NFV orchestrator isà under deployment. C. Migiration period for disaster recoveryà We evaluated the VNF recovering process for disasterà recovery. In this process, there are four steps.à Step 1: Host OS installation Step 2: VNF image copy Step 3: VNF configuration copy Step 4: VNF process activation This process is started from the host OS installation becauseà there are VNFs that are tightly coupled with the host OS andà hypervisor. There are several kinds and versions of host OS,à so the host OS can be changed to suite to the VNF. Afterà host OS installation, VNF images are copied into the createdà VMs. Then, the VNF configuration parameters are adjustedà to the attributions of the secondary data center environmentà (for example, VLAN-ID and IP address), and theà configuration parameters are installed into VNF. After that,à VNF is activated. In our test environment, a virtual router can be recoveredà from the primary data center to the secondary data center,à and the total duration of recovery is about 6 min. Eachà duration of Steps 1-4 is 3 min 13 sec, 3 min 19 sec, 11 sec,à and 17 sec, respectively. To shorten the recovery time, currently, the standby VNFà is able to be pre-setup and activated. If the sameà configuration can be applied in the secondary data centerà network environment, snapshot recovering is also available.à In this case, Step 1 is eliminated, and Steps 2 and 3 areà replaced by copying a snap shot of an active VNF image,à which takes about 30 sec. In this case, the recovering time isà about 30 sec. V. CONCLUSION Our method using cloud and NFV functions can achieveà DR with less cost. We proposed a multi-campus equipmentà virtualization architecture for cloud and NFV integratedà service. The aim of this proposal is to migrate entire ICTà infrastructures on campus premises into cloud and NFVà platforms. This architecture would encourage academicà institutions to migrate their own developed ICT systems located on their premises into a cloud environment. Adoptingà this architecture would make entire ICT systems secure andà reliable, and the DR of ICT services could be economicallyà manageable. In addition, we also analyzed the cost function, andà showed a cost advantages of this proposed architectureà described implementation design issues, and reported aà preliminary experimentation of the NFV DR transaction/
Wednesday, November 13, 2019
Hypocrites Essay -- Plagiarism Research Essays
Hypocrites In the beginning stages of this research paper, I had no clue what to write regarding the topic of plagiarism. I began my first paragraph in class just as everyone else did. Yet, I could not help but feel that this essay was going to be immensely boring if I were to continue writing on the act of plagiarism itself. My paper demanded the extra spark that would capture my audience in order to make them feel privileged to read my astounding research paper. So I became determined to start my research before my introduction paragraph. I knew so little about plagiarism that I had to start researching immediately. I was undeniably bored when I began a fun search and stumbled upon multiple articles of preachers and pastors who have been accused or even charged with stealing other pastors sermons. Sometimes, the thieves went as far as cutting and pasting the sermon or article directly to their own sermons. Now, borrowing or stealing has been on every persons thoughts ever since written language came into existence Plagiarism has been present in our history for numerous years. However, plagiarism had not been a vast issue among many people until the human race decided to claim copyrights of their own ideas. I am sure, however, that someone else probably thought the exact same idea before that person or at the same time s/he did, but did not get the opportunity to copyright the idea. The pursuance of ones ideas has become a mad rush to claim the idea on paper and send it to a copyright/patent office as soon as possible. The process of stealing ones ideas goes as far back as written language and then even farther. Peter W. Morgan, owner of The Idler: A Web Periodical, wrote, even before the development of written langu... ... Capeloto, Alexa. Rectors ethics are questioned. Detroit Free Press 01 March 2002 http://www.freep.com/news/ locoak/church1_20020301.htm(01 Dec. 2003) Mattingly, Terry. Plagiarism and the pulpit. Terry Mattingly on Religion http://tmatt.gospelcom.net/ column/2003/06/25/(01 Dec. 2003) Reynolds, Glenn H., Peter W. Morgan. Chapter Five: A Plague of Originality The Idler: A Web Periodical: 23 Jan. 2002. http://www.the-idler.com/ (01 Dec. 2003) Smith, Peter. Plagiarism in the pulpit not new, but Internet makes it easier to do, and catch. The Courier-Journal 21 July 2002. http://www.courierjournal.com/localnews/2002/07/21/ke072102s245442.htm (01 Dec. 2003) The Student Bible, New International Version. Michigan: Zondervan Publishing House, 1996. Twister. Dir. Jan de Bont. Per. Helen Hunt and Bill Paxton. Warner Brothers and Universal Pictures, 1996.
Subscribe to:
Posts (Atom)