Saturday, January 25, 2020

Simple Network Management Protocol (SNMP) for MIB

Simple Network Management Protocol (SNMP) for MIB SNMP Abstract: SNMP or Simple Network Management Protocol (SNMP) is an application layer protocol that provides the exchange of management information between network devices. SNMP is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Through this research the emergency of network management will be managed for fire alarm, power off. Managing devices such as computers is vital and tracking for its safe and emergency issues will assist in many aspects such as identifying location, solving communication issues etc. In this research we will propose a SMNP based solution for effectively managing computer devices. In this research we will propose a MIB [Management Information Base] using ASN1.0 specification and also proposing a prototype on the implementation. Then based on our proposed prpotype we will evaluate. ASN for the proposed MIB has been designed as part of this research but it could not be implemented with real time implementation due to lack of resource for SNMP based developemnt. Aim: Propose a solution for SNMP based Emergency management for an organization Objectives: Research on network management using SNMP. Proposing an MIB Tree for the emergency network management Critically evaluating the proposed solution for SNMP based emergency network management. Introduction Network management is managing and maintaining different components and its functioning in a network. Network should be managed in an efficient way for avoiding different attacks. Several protocols are used for managing network. Management plays a vital role for monitoring the state of the network and analyses the performance. Among such protocols Simple Network Management Protocol (SNMP) is one which is used for monitoring the network. The main purpose of this protocol is designed for maintaining devices in network in internet protocols (IP). The network management performance can be used for transporting network information and its elements functioning (Stephen F. Bush and Amit B Kulkarni, 2001). SNMP in networks provides reliable and integrated network management. Several attacks may occur in network, for analyzing networks should be managed in an efficient way. The SNMP manages the network with the usage of different commands to the network and is useful in different networks. Th ere are several architectures for SNMP which is used depending upon the network mechanisms. It performs several operations in network for managing different components in the network. For performing all these operations SNMP uses Management Information Base (MIB) for handling components in the network. In this project SNMP and its performance in network is analyzed with the help of case study approach. The emergency preparedness is important part in network management and is equal to other maintenance works. One of the problems in network is traffic (German Goldszmidt and Jurgen Schonwalder, 2003). Sometimes the flow of data is more in network which causes traffic in network. In order to avoid traffic limited number of data should be transmitted in the network. Another problem that occurs in networks is security. Sometimes intruders may involve in network which leads to loss of data, in order to avoid this SNMP protocol performs several operations. For identifying network problems w ith SNMP components in network uses Management Information Base. Manager plays major role in managing the network. SNMP emergency services are very much helpful for the managing the network. This project uses emergency management of SNMP in order to solve problems that occur in networks (Geln E. Clarke, 2005). Hence from above context it can be concluded that SNMP is one of the protocol which helps in managing the network. Several problems may occur in network like traffic and security to the data. SNMP emergency management helps in managing the networks by performing different operations. Research Problem The network management protocols identify the communication between the network management server programs that are executing on the router or host, and the network management client program invoked by the manager. Considering these factors, it can be expected that the network management protocols contains numerous commands (Douglas Comer, 2006). The major disadvantage of constructing the network management protocols is the resulting complexity because this protocol needs an individual command for every operation on the data item. The Simple Network Management Protocol (SNMP) is useful in such types of cases. SNMP makes an interesting approach to network management. In place of defining the large command set, SNMP directs all the operations in a fetch-store paradigm. SNMP makes use of only two commands which allow the manager to store values into the data item and get the value from the data item. Other operations are described as the side-effects of the two operations. The main adva ntage of using the fetch-store paradigm is simplicity, flexibility and stability. SNMP is stable as its meaning remains fixed. SNMP is also easy to understand, debug and implement as it evades the difficulties of using special cases for every command. Finally the SNMP is flexible as it can contain the arbitrary commands in a well-designed framework (Douglas Comer, 2006). Problem Context: Importance of emergency in SNMP In the present scenarios of the Simple Network Management protocol, there are numerous of conditional factors that involves in defining the perspectives of the response in emergency SNMP (Amjad Umar, 2003). The emergency response can be used as a tool guide to the proposed scheme. The situation of the emergency can be found in the several areas of the networking management. The state of emergency can be found in many context such as market demand, failure in the key resources, shortage in the areas of the supply, in the same way there is a need of the emergency can be found in the areas of the political sciences and public administration. As in the same way in this research the point to be focused on is the emergency response of the Simple Network Management Protocols (Harold F. Tipton and Micki Krause, 2004). The factor that contributes to the difficulty in the emergency are lack of flexibility in making decision, lack of available resources, lack of response in option, failure in c ommunicating and cascading the events. To overcome these whole problems in the SNMP emergency, it must have to develop the outstanding plans that can be used for giving the training on the extensive simulation of the Emergency Response. Most of the organizations get failure only because of the one reason that is managing the emergency situations (Rob Cameron, Neil R. Wyler, Trent Fausett, Kevin Fletcher, Patrick Foxhoven and Mark J. Lucas, 2007). If the emergency situations in an organization are maintained in a superior approach then it may lead to loss in the communication, information and essential data. Hence a proper management system is required for organizing the emergency situations in Simple Network Management protocol. This protocol is used to reduce the traffic when a emergency situation is occur in the network, then the preventive measures that has to be taken are recovery, preventives in the system, improving the communication scheme, performance and work on the basis o f the propriety. Research Method: Case study is one of the best methods for researchers; these are effectively used by the people to understand the contest of the study. It is less complexity and adds strength to the data which is used in the research. The steps that is followed in this case study are * Determine the theme of the research * Select the cases and analysis the techniques for gathering the data * Preparation for the collection * Collection of the data according to the field * Estimate and analyze that data * Preparation of the report This study is to manage the emergency in Simple Network Management protocol. The organization that involves in the SNMP managements standards, that provides the major introduction to the organization management. There are several conditions that have an impact on the areas like co-operation and trading (Bill Gillham, 2000). To develop the management system in the SNMP is based on the information and communication. This includes the problems, listing the questions, describing the method that involve in the research. The key features of the report includes the detail of the Simple Network Management Protocols in the management information of specific data that relates to the successes or disappointments experienced by the organizations that were conveyed during data collection and answers or comments illuminating issues directly related to the research questions (Ben Beiske, 2007). The researcher develops each issue using quotations or other details from the data that is collected, and points out the uses of data where it is applicable. The data also includes the confirming and conflicting findings from literature reviews. The report conclusion makes assertions and suggestions for further research activity, so that another may apply these techniques to another electronic community, network and its management to determine whether similar findings are particularly to in communities that belongs to the network (George L. Dunbar, 2005). Final report distribution includes all participants. Within the case study it has been analyzed at the first time whether the technique used with each non-profit organization under study. The assigned investigator studies each organizations written documentation and survey response data as a separate case to identify unique patterns within the data for the single organization. A detailed case study that is, written ups for each organizing management, categorizing interview questions and answers and examining the data for within group similarities and differences. Cross case analysis follows. Investigators examine pairs of cases, categorizing the similarities and differences in each pair (Kathleen Stassen Berger, 2004). Investigators then examine similar pairs for differences, and dissimilar pairs for similarities. As patterns begin to emerge, certain evidence that may stand out as being in conflict with the patterns. In those cases, the investigator conducts follow-up focused interviews to confirm or correct the initial data in order to tie the evidence to the findings and to state relationships in answer to the research questions. Chapters Summary: In summary, here there is a discussion about the case studies in terms of the different types of case studies which is found in the literature. The case studies are considered to be useful in research as it enable researchers to examine data at the fine level. It is an alternative to quantitative or qualitative research, case studies is a practical solution to when a big sample population is difficult to obtain. Although the case studies have a variety of advantages, so it is used for data management for having the better situations and it provide a better insights for the document in detail to which the subjects of Interest is related. Case study method has always been criticized for its lack of severity and the tendency for a researcher. It is the base for establishing reliability and generality in subjected to uncertainty when a small sampling is deployed. Some case study research is dismissed as useful only as an exploratory tool. Hence as the case study have various advantages o ver the qualitative or the quantitative researches. So it is used in this research. Summary of chapters: Chapter 2 includes the Literature review for the related research work. Chapter 3 discusses the analysis of problem requirements which is providing a solution for managing or developing emergency based system. We have used SNMP and MIB based approach to provide the design of the emergency based provision. We will be using MIB tree and ASN based design and development for this. Chapter 4 includes the development and data collection which will be obtained through SNMP Query for Firealarm and Power off. Chapter 5 covers the analysis and evaluationof results or test data, This has the effectiveness of the research and proposed solution for emergency. Chapter 2: Literature Review 2.1 Network Management Network Management is a service which employs different applications, tools and devices to assist the network managers in maintaining and monitoring networks. Hence the meaning of Network Management is different for different users. For example in certain cases the network management involves a single network advisor monitoring the network activity by utilizing an obsolete protocol analyzer. In other cases the network management involves auto polling, distributed database and high end workstations producing real time network topology traffic and changes (Network Management n.d). Architecture of Network Management Many of the network management architectures use similar set of elements, structure and relationships. The managed devices or end devices like the computer systems and network devices run the basic software which allows them in producing alerts when problems are recognized. For instance consider the exceeded user determined thresholds. The alerts received are programmed by the management entities to respond by executing one, group of actions like operator notification, system shut down, automatic attempts and event logging by system repair. Even the entities of the management can be polled for end stations to verify the values of definite variables (Network Management n.d). The polling can be user initiated or automatic but the agents of managed devices react to all polls. These agents are the software modules which first compile information regarding managed devices in which they reside. Later the information is stored in management database and is finally produced to the management entities reactively or proactively of the network management systems (NMSs) through a protocol of network management. The network management protocols include Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP). Figure 1 represents basic network management architecture (Network Management n.d). Sampling Techniques Network Management involves the status information of queue occupancy, latency, load and other parameters which is available from devices like switches, networking interfaces and routers. This information of the network management is accessed by the Simple Network Management Protocol (SNMP) (Edwin A. Hernandez, Matthew C. Chidester, and Alan D. George, 2000). The Network Management Station (NMS) of the SNMP queries the agents or network devices to evaluate the status of the network links or devices periodically. The accuracy of the data measured is determined by period of sampling. A transient activity cannot be detected accurately if the sampling interval is large and a greater storage capacity is required at the NMS as small intervals consume larger bandwidths on the network. For instance, a burst of major action with few seconds is probable to be undetected with sampling interval of some minutes. To balance the accuracy with sampling several sampling techniques have been practical to the managers of network. Some of these sampling techniques are: SNMP Architecture: Simple Network Management Protocol (SNMP) is the network protocol which is used in network management systems. This protocol is designed to administer the devices on an Internet Protocol (IP) network. It collects the information from different network devices such as routers, servers, hubs on an internet protocol. It is used for managing complex networks. The SNMP architecture consists of different set of components such as network management system and the SNMP agent and the managed device. The managed device is also known as the network elements. It is connected to the data network. The SNMP agent collects the data from the managed device and transforms it to another format using SNMP. This agent acts as a server, switch, hub and many others. The NMS is the one of the module of the SNMP which basically executes the applications which can manage and control the managed devices like physical devices such as routers, network interfaces and software. They manage the remote monitoring of these managed components and do the sampling. Then after do the analysis of the collected information and finally gives the presentation of the information (Steven Karris T, 2004). All the devices in the architecture are referred as managed devices. The managed device in the architecture acts as an SNMP agent which facilitates the network management syst em to recover the status of managed device. All the available information of the managed devices is been addressed through management information base (MIB). There are two types of MIBs. They are scalar and tabular. The scalar object of MIBs denotes the single object instances and the tabular objects of MIBs define the multiple object instances. If the network management system recognizes which device to be managed in MIB then it changes the MIB objects with the relevant requests to the agent of SNMP. The information of MIB is loaded into the network management system with the help of MIB file. The network management system acts as the master device where as the managed device and the SNMP agent acts as a slave device. It provides security by preventing unauthorized users to gain access on the system. This security is performed with the help of community string. This string acts as the password and groups the data either to read-only or read-write areas (Thomas Porter, 2006). The ap plication server of the SNMP agent is designed to run the specific applications. The SNMP agents and the network management systems communicate each other with different set of operations such as read, write and trap. The NMS requests the SNMP agent through read operation and it sends the information through write operation. The notifications are sent from SNMP agent to NMS through trap operation. Hence from the above context it is understood that SNMP is used in many applications. It is implemented in many operating systems. The storage network of the SNMP architecture consists of switch and the hub which acts as the interface between the components. All the devices such as managed devices, MIB are connected only through storage network. Tape library contains more than one tape drives which stores bulk amount of data. It acts as a SNMP agent. The SNMP agent translates the whole information. Different SNMP versions are derived to increase the performance of the system. SNMP ahs the followings: Network Element: if any tool connects to the network then that tool can be called as network element. Some of the tools like gateways, hosts, terminal servers, servers, switches, firewalls, and active hubs. Management station: this station includes a platform which contains software in SNMP that manages and controls the network elements. SNMP agent: it is a software management agent which is responsible for executing the functions in the network management after receiving the messages from the management station. SNMP request: a message which travels from management station to SNMP agent in the network device. SNMP trap receiver: it even receives the notification messages from SNMP agent on network devices. Management information base: it is a method which identifies the elements in SNMP database. SNMP Architecture Simple Network Management Protocol is very popular not only because of its simple operation but also due to easy of usage. This protocol is very useful for manufacturers and seller as it is easy to use SNMP technology for the manufacturers while adding network management functions to their products (Kerrie Meyler, Cameron Fuller, John Joyner Andy, 2008). Components of the SNMP Architecture: The SNMP architecture mainly contains two components, managers and agents, apart from standards which are used for controlling the interactions between components. By using SNMP commands, these managers and agents communicate with each other. These commands are explained in RFC 1157. Here, the managers organize the functioning of agents. The agents provide the data to the managers by interacting with the devices like routers and computers. These devices are also known as managed devices (Ramadas Shanmugam, R. Padmini S.Nivedita, 2002). The protocol used for communication between manager and agent is referred as SNMP. Generally, the SNMP managed network consists of three components; they are (Deon Reynders Edwin Wright, 2003): * Managed devices. * Agents. * Network-management systems (NMSs). Managed devices: It is a network node which includes SNMP agent which exists in a managed network. These devices gather and store the management information. By using SNMP, managed devices enable the management information to network-management systems (NMSs). It also responsible for querying the agents by using SNMP commands. Managed devices can also be known as network elements, these can be any type of devices like routers, switches, hubs, access servers, bridges, IP telephones, printers, or computer hosts (Gilbert Held, 2003). Agent: It is a network-management software module which exists in managed devices. Agent software represents one or more program modules which operate within the managed devices like bridge, router, workstation or gateway. Each of the managed agent stores information and provides these information to the manager after receiving the request from the manager. It translates the management information into a well-suited form with SNMP (Deon Reynders Edwin Wright, 2003). Network-managed systems (NMSs): This system performs applications that examine the managed devices. It provides a large amount of memory resources for network management. In any managed network, there should one or more number of NMSs (Gilbert Held, 2003). SNMP operations SNMP reads or writes the values in applications from SNMP devices. There are four basic SNMP operations, they are Get, Get-next, Set and Trap. Get and Set are the basic operations which are mostly used for reading and writing data to a node which are identified by a specific OID. It also requests the values of one or more SNMP objects and sets the values of SNMP object. Get-next reads the content of the tables at a time and steps through MIB hierarchy. Trap is an asynchronous notification from server (agent) to client (manager) which reports the occurrence of an interesting event. It sends the information in the form of packet to SNMP (Evi Nemeth, Garth Snyder Trent R. Hein, 2006). Basic commands of SNMP Commands are explained in RFCs, there are many RFCs which relate to SNMP components. The importance of these RFCs is it describes the operation of the protocols. Generally, there exists three RFCs; they are RFC 1155, RFC 1157 and RFC 1213. RFC 1155 used for Structure of Management information (SMI), it explains about the data types and structure that should be used for managed objects. RFC 1157 is used for Simple Network Management Protocol (SNMP), it describes protocol and operation of SNMP. RFC 1213 is used in Management Information Base (MIB) (Philip Miller, 1997). By using four basic commands in SNMP, managed devices are monitored and controlled. They are namely read, write, trap, and travel operations (Deon Reynders Edwin Wright, 2003). Read command it is used by NMSs, in order to monitor the managed devices. NMS inspect various variables which are maintained by managed devices. Write command to control managed devices, these commands are used by NMS. The variables in the managed devices are changed by NMS. Trap command- these commands are utilized by the managed devices to asynchronously report the result to the NMS. Whenever there are certain results in the managed devices, then managed devices send rap to NMS (Deon Reynders Edwin Wright, 2003). Transversal operations- NMS make use of these operations to identify the variables which supports managed device and also collects the data in variable tables like routing table. SNMP Network Management Managing a network is very difficult task for any administrator as it deals with huge number of nodes and protocols. The best way to keep track of all the nodes that exists in a network is to identify and implement an effective protocol which can allow a user to read or write a particular piece of information. SNMP is one of the network management protocol preferred by most of the network administrators in organizations. SNMP can be available with three versions; each has enhanced features when compared with its previous versions. SNMPv3 can offer high security features while managing organizational network. A network manager in an organization has to play a key role in managing the networks. Using of SNMP for network management can be advantageous as it can solve most of the problems that exists in a network (Sebastian Abeck and Adrian Farrel, 2008). Thus, performance of network mostly depends on the network protocols used by the administrator. Network management using SNMP protocols can be identified as a request/reply process. SNMP makes use of request messages like GET and SET while managing a network. Through GET request a SNMP server can retrieve the required information from a node where as SET request can stores specific information on a node. SNMP servers mostly use GET requests in order to manage a network. SNMP implementation efficiency largely depends on these requests and replies from the nodes or servers (Dinesh Chandra Verma, 2009). A network administrator has to recognize the network details before implementing SNMP protocols. Client programs in networks can be utilized by network administrators in order to display the actual details of a network. While displaying network details a client program acts like an interface. When a user or administrator wants to access specific information, a request must be sent to the server. For sending request to particular node, a client program makes use of SNMP protocols. R equests from the users will be received by SNMP servers running on the specified node. SNMP server processes these requests and finds the information required for a user. Finally a client program will display the information based on the response received from SNMP servers. The major aspects that has to be understood in SNMP network management is, how a user can specify the information request and how a server recognizes the required information (Larry L. Peterson and Bruce S. Davie, 2007). SNMP makes use of Management Information Base (MIB) for retrieving the required information. MIB performs the function of identifying information from SNMP databases. As SNMP uses MIB, a particular syntax for the requests has to be specified. For implementing SNMP with MIBs a standard specification like ASN.1 can be used. A SNMP client agent keeps an ASN. 1 identifier in MIB, SNMP server searches the required information based on the identifier specified by the client. For managing a network SNMP makes use of various network components. Every SNMP agent will interact with MIBs and Network Management Systems while managing a network (Monique Morrow and Kateel Vijayananda, 2003). Hence from the above discussion it can be understood that, SNMP operates in client/ server mode which establishes virtual connections with the servers to provide information to the Network Management Systems (NMS). The information provided to NMS can provide the devices status at a particular time. MIB in SNMP refers to the databases controlled by SNMP agents and SNMP servers retrieve the information based on MIBs in networks. Network management through SNMP can be an effective and most used method in present organizational networking environments. Many large organizations use SNMP tools for managing their networks effectively. Why SNMP SNMP is defined as simple network management protocol. Network management system will make use of SNMP for communicating with various network objects. SNMP is mostly used for the remote management of network device. SNMP is widely used because it easy to use and user can easily add the network management functions to their new or existing products. SNMP runs on various devices like network tools, core network devices and office network tools (Ray Rankins, Paul Jensen and Paul Bertucci, 2002). SNMP allow network and system administrator to access network devices that are present in their networks such as server, routers etc. SNMP for the management of network device contains one SNMP station and management station. Management station is mainly utilized to arrange the network elements and to receive the SNMP traps from those elements. By making use of SNMP, network monitor can observe changes and alerts that are identified in the network elements. If the size of network is increased th en method called management is required. In SNMP errors obtained are varies from one agent to other agent but will include system failure, disk warning etc (Harold F. Tipton and Micki Krause, 2004). If the device passes an alert to the management station then network management itself involves in rectifying the problem. Time to time configuration request should be send to the device. If provided string is correct then automatically configuration of the device will change according to the requirement. Organizations can identify the status of all equipments and can also perform remote trouble shooting. SNMP is nothing but a protocol that is used to develop and manage nodes that are present in the network system. SNMP allows system administrator to work on the problems that are executed in the network and should plan for the growth of network. Network management service will identify the changes that are done in the network devices based SNMP (Douglas R. Mauro and Kevin James Schmidt, 2005). SNMP consists of three features; they are managed device, agents and network management system. Managed device is usually a network node. It contains SNMP agent that is located on a managed network. Management data that is gathered and stored will be available to network management system of SNMP. Managed devices can also be called as network elements. An agent is nothing but network management module software module which is present in the management device. This device has great knowledge on local management information and this information can ne transferred to SNMP. NMS usually carry out applications that can manage and control the managed device. Hence from the above discussion it is identified that SNMP is a protocol which can help in managing the networks. Why MIB Management Information Base (MIB) is an essential component for handling a network. The importance of MIB increased as it comprises data definitions for managed objects. For managing the networks through SNMP protocol, an information base is necessary. The information base must allow a user to retrieve required data. MIB provides the facility of managing databases in SNMP agents. Managed object instances stored in MIBs will be exchanged between SNMP agents and managers (Stephen B. Morris, 2003). Thus, MIB is necessary for managing the information while implementing SNMP protocol in networks. Managed objects in MIB will be specified with a unique identifier, a user has to send request regarding information by following a particular syntax. MIB in SNMP also helps in recognizing the present status of a network device. Identifying the network information in case of small networks can be done very easily as the host names and IP addresses can be available to the users directly. But in lar ge networks, a MIB

Friday, January 17, 2020

Cultural distance assignment Essay

CDj is the cultural distance between the host country (j) and the home country (in this case Germany). It is calculated with a summation of 4 different variables indicating different cultural dimensions. These are uncertainty avoidance, power distance, individualism/collectivism and masculinity/femininity. is the country j’s score on one of the four cultural dimension is the score of the home country (in this case Germany) on this dimension. is the variance of this particular dimension. Firstly, the distance on each dimension between the host country j and the home country (in this case Germany). Secondly, this number is squared. After squaring minus each variable is divided by the variance of that variable. And finally, all these four variances are added together and divided by 4. 2. What is the difference between mean and variance? Can you explain the example given in the lecture in your own words? Mean and variance are both about distribution, but mean refers to one measure of the central value for a probability distribution. It is the average of a set of measurements. On the other hand, variance is a measure of how far a set of numbers is spread out. In a statistical probability graph the difference in variance is made visible in the height of the graph. A low variance indicates that the data points are close to the mean. This can be recognized in a normal distribution graph where the curve is either flatter or steeper. A flat curve indicates a high variance as data points are far away from the mean, whereas a steep curve indicates a small variance as the data points are close to the mean. 3. Calculate the distance on each dimension between Germany (our home country) and a specific host country using the Excel program.? Tip: you can use the formula editor in Excel to calculate the distance on e. g. power distance between Germany and Argentina, the first country in the sample. You can copy-paste the formula in the other rows/columns. Power distance: Argentina – Germany: 49-35 = 14 Uncertainty avoidance: Argentina – Germany: 86-64 = 21 Individualism / collectivism: Argentina – Germany: 46-67 = -21 ? 21 Masculinity / femininity: Argentina – Germany: 56-66 = -10 ? 10 4. The Kogut-Singh index of cultural distance also contains the variance of each dimension. Answer the following questions: a. In the bottom row of the columns you will find the variance for each culture ? dimension. What dimension has the highest variance? Individual – collectivism b. What does a high variance mean Tip: to calculate the variance yourself, you can use the formula editor of Excel and search for â€Å"variance†. A high variance means that the date points are very spread out from the mean and from each other 5. Calculate the cultural distance using Kogut and Singh formula while using Germany as the home country. Tip: follow the different steps as explained in the main lecture, and first calculate the difference, ? the squared difference, the variance, and the overall cultural distance. Cultural distance = 0,547 ? [(14*14)/507,68 + (21*21)/559,42 + (-21*-21)/621,34 + (-10*-10)/329,58)]/4 6. Which four countries have the lowest cultural distance to Germany? Switzerland, Italy, South Africa and Luxembourg 7. Which country has the highest cultural distance? Guatemala 8. What is the average cultural distance between Germany and these 57 other countries? 1,6046894 9. Pick a host country and relate the cultural distance score between Germany and that ? host country to the 7 points of critique raised by Shenkar as discussed in the lecture. We picked Egypt, which has a cultural distance score of 1,748. 1. The illusion of symmetry: you cannot assume that the cultural distance from Germany and Egypt is similar to the cultural distance from Egypt to Germany. Because of recent conflicts in Egypt it is probably less attractive for other countries, including Germany, to do business or invest in Egypt, whereas for Egypt itself, it is not hard to do business in Germany. 2. The illusion of stability: Cultural distance is measured at a single point in time, but cultures may change over time and therefore, cultural differences may also change over time. Currently the conflict in Egypt is still ongoing which makes cultural difference between Germany and Egypt bigger. However, if this conflict ends, the cultural difference may shrink again. 3. The illusion of linearity: in case a German MNE already had an entity in Egypt and is considering a second one, the obstacle of starting a second entity is lower than it would have with the initial entity introduction. The effect on cultural distance therefore depends on the experience already gained and is not a linear process. 4. The illusion of causality: Kogut and Singh’s formula only focuses on cultural difference, but distance is a multidimensional construct and should be studied not in isolation but together with the other three dimensions of distance, namely; institutional/administrative distance, geographic distance and economic distance. For instance, the cultural difference between Germany and Egypt is 1,748 and the geographic distance between Germany and Egypt is 3208 kilometer. The cultural difference between Germany and Australia is 0,320 (a lot smaller than 1,748) and the geographic distance between these two countries is 14482 kilometers (a lot further than 3208 km). 5. The illusion of discordance: the assumption is that all cultural aspects of the cultural distance between home and host country matter equally, but depending on the country, some dimensions of a culture matter more than others. Take language and religion. Both cultural aspects, but when Germany does business with the Netherlands difference in language would matter a lot more than difference in religion, whereas when Germany does business with Egypt, the religion factor would weigh a lot heavier. 6. The assumption of corporate homogeneity: by using national cultural measures, the CD concept only incorporates variance in the national culture but does not consider possible variances on a corporate level. National culture vs. organizational culture is left out. In Egypt, a company which employs employees of many different nationalities will have less cultural differences with a German company in comparison to a company which only employs Egyptians. 7. The assumption of spatial homogeneity: when examining the cultural differences on the basis of national level scores, possible cultural variances within that same country are left out. In Egypt it would not be correct to look at the country as a whole, since within the country (city versus rural areas) there are different cultures and sentiments based on different takes on for example Muslim religion. This could affect the way different companies do business and therefore reduce or expand the cultural difference between Germany and Egypt. 10. Assess the strengths and weaknesses of the Kogut and Singh measure of cultural distance. Kogut and Singh have made an effort of creating an overview on the cultural distance between countries. The overview is quite meticulous and based on empirical research, taking four dimensions – created by Hofstede – of cultural distance into account. Although the measure of cultural distance should provide realistic information for organisations that seek new markets, it is not able to do so. The measure should be seen as an indicator of cultural distance rather than an absolute number. Supported by Shenkar’s seven points of critique1, the weaknesses of Kogut and Singh’s theory will be assessed. Supported by Kim and Gray’s article, its strengths will be assessed2. As Shenkar researched effectively, Kogut and Singh’s measure is quite ambiguous. It creates several illusions of cultural distance. Deriving from these seven points made by Shenkar, the measure cannot be used in practice. The differences between reality and theory are too large. For example, as Shenkar explained in point 5; â€Å"The implicit assumption that differences in cultures produce lack of â€Å"fit† and hence an obstacle to transaction is questionable. First, not every cultural gap is critical to performance. As Tallman and Shenkar (1994, p. 108) note, â€Å"different aspects of firm culture may be more or less central, more or less difficult to transmit, and more or less critical to operations†. Second, cultural differences may be complementary and hence have a positive synergetic effect on investment and performance. ’3 Companies are shown one CD number, but the importance of the various dimensions creating this number is different for each company. For example, a company involved in financial derivatives that seeks to create a subsidiary overseas may be less concerned about the individualism/collectivism-dimension than about the uncertainty avoidance-dimension, as these companies are inherently making money of uncertainty. Thus, the CD number does not suit the function implied by Kogut and Singh. Singh and Kogut create an illusion that this CD number helps companies finding a suitable strategy for expanding abroad. The CD number should provide hard data for finding this strategy. Due to the difference between theory and practice, this number cannot provide practical data. However, the measure is suitable for other goals. For one, the measure can explain corporate behaviour in new markets. Kim and Gray researched the applicability of the CD measure. They concluded that relationship between the CD measure and corporate behaviour has some plausible consistencies. 4 The ownership mode a company takes in a new market is indeed dependent on the cultural distance between the host and home country. Kogut and Singh’s measure is thus accurate, but not practical. In conclusion, the measure of Kogut and Sing is accurate enough to explain corporate behaviour in hindsight, but cannot be seen as a practical calculation for choosing a business strategy. A company may tend to get confused by the calculation method, as it equally takes all dimensions into account. However, in the end, a company will probably handle appropriately to the new market’s culture. This is shown in Kim and Gray’s research.

Thursday, January 9, 2020

The Inner City Drug Problem - 2549 Words

Aside from being among the most undesirable of places that a person could live, the inner cities of the United States are said to be a horrible gangland full of murder, prostitution, and drugs. While this description is overblown in some cases, the inner city definitely resembles the definition given. Inner cities across the country are havens for gangs and the activities that keep them financially viable: prostitution, robbery, and drugs. The focus of this paper will deal with the problem of drugs in the inner city. Rejecting a broad definition of â€Å"drugs,† that includes alcohol, cigarettes, and legal prescription drugs, I will be concentrating on the illicit â€Å"street drugs† that proliferate in the inner cities of the United States. In†¦show more content†¦These kids are on the lowest rung of the drug-dealing ladder. They can make three or four hundred dollars a week just watching out for police. Further up the ladder, the actual street dealers can make hundreds of dollars a day, while the higher ranking gang members make thousands a day. The drug dealing enterprise is very attractive to inner city young people because most are poor, uneducated, and have a bleak outlook for the future. And if you think about it pragmatically, McDonald’s pays a couple hundred dollars a week after taxes; a street level dealer makes that and more in a day without having to pay taxes. Two-thirds of all inner-city male youth, both black and white, believe that they can make more money from crime than from legitimate work. As a result of these economic factors, drug dealers have become symbols of success. Young people also see the money and prestige associated with drug dealers in their communities and they are sucked in by the â€Å"glamorous† side of the gangs. Also, in a community where people often feel powerless and destitute, it is liberating to acquire the sense of power that is associated with membership in the gangs. And where a kid was once at the mercy of the uncontrollable aspects of his inner city world, the gang has given him a sense of control over his helplessness, and the power to control those who would harm him.Show MoreRelatedAmerica s Drug Enforcement And Addiction1725 Words   |  7 PagesIt might seem like the United States has become more lenient on drug enforcement and addiction. Considering that municipalities removed penalties for bringing in someone overdoing on drugs into the emergency room and have lowered the minimum amount of time someone spends in prison for drug possession. However, I argue these changes are motivated by the changing face of heroin or its increasing use among the white suburban middle class. For instance, more social resources have been allocated to today’sRead MoreThe Impact Of Policing On The Inner City Urban Areas1408 Words   |  6 PagesHow has the policing strategies changed over time in the inner-city urban areas? There are many answers to this question. Police over the years have changed their policies mostly due to the war on crime and drugs. These policies have had a direct impact on the lives of the inner-city residents as the residents start to live their lives based on avoiding the legal system. The shift in policing has affected their day to day living as well as their overall happiness. Goffman describes in her articleRead MoreSubstance Abuse Increasing in Inner-City Minorities1176 Words   |  5 PagesSubstance Abuse Increasing in Inner-City Minorities Substance abuse is an ever increasing epidemic facing Americas inner- city minorities. There are several different drugs that are gaining popularity amongst inner-city youths 1. Juice, that is marijuana soaked in embalming fluid is starting to show up in more and more inner east coast cities 2. Crack or rock cocaine is by far one of the most addicting drugs out there, its been engulfing Americas inner-cities since the early 80s 3. HeroinRead More Substance Abuse Increasing In Inner-city Minorities Essay1120 Words   |  5 PagesAbuse Increasing in Inner-City Minorities nbsp;nbsp;nbsp;nbsp;nbsp;Substance abuse is an ever increasing epidemic facing Americas inner- city minorities. There are several different drugs that are gaining popularity amongst inner-city youths 1. Juice, that is marijuana soaked in embalming fluid is starting to show up in more and more inner east coast cities 2. Crack or rock cocaine is by far one of the most addicting drugs out there, its been engulfing Americas inner-cities since the earlyRead MoreCultural Analysis of Boyz N the Hood Essay1652 Words   |  7 Pagesearly 1990s, the decay of inner-city America largely went unnoticed by the general American public. However, the rise in popularity of gangster rap and the release of such films as New Jack City and Menace II Society drew the publics’ attention toward the largely ignored urban areas. Of all the films in the genre that came out, though, one in particular stood out. Boyz N the Hood, directed by John Singleton, became widely acknowledged as the definitive film for inner-city African Americans. RegardlessRead MoreIn Search Of Respect Selling Crack In El Barrio Summary1248 Words   |  5 Pagessocial marginalisation in inner city America in his ethnography ‘In Search of Respect – Selling Crack in El Barrio’, won critical acclaim when first published in 1995. For the first time, an anthropologist had managed to gain the trust and long-term frien dship of street-level drug dealers in one of the nation’s roughest ghetto neighbourhoods – East Harlem (Bourgois, 2003). He had originally come to study poverty and ethnic segregation, the political economy of inner-city street culture, but foundRead MoreReview of Code of the Street: Decency, Violence, and the Moral Life of the Inner City1533 Words   |  7 Pages For this assignment I decided to read the book Code of the Street: decency, violence, and the moral life of the inner city by Elijah Anderson. This book is about how inner city people live and try and survive by living with the code of the streets. The code of the streets is basically morals and values that these people have. Most of the time it is the way they need to act to survive. Continuing on within this book review I am going to discuss the main points and arguments that Anderson portraysRead MoreAnalysis Of The Dream On Isolation By Laurence Ralph s Renegade Dreams Essay1304 Words   |  6 Pages conversation The theoretical conversation Ralph explores in the book is isolation. He draws ideas from Wacqaunt and Wilson’s The Cost of Racial and Class Exclusion in the Inner City. In the article, the central argument is there is an interrelated set of characteristics that corresponds to social-structural problems in the inner city and the process has triggered â€Å"hyper-ghettoization.† The evidences Wacquant and Wilson present are mainly statistical and anthropology data. The article explains many ofRead More What Is A Hero? Essay1173 Words   |  5 Pageswho are less fortunate. nbsp;nbsp;nbsp;nbsp;nbsp;There is a growing concern in the United Stanbsp;nbsp;nbsp;nbsp;nbsp;tes, where health problems are increasing at an alarming rate. The diets of many men, women and children are unhealthy, and lead to high blood pressure strokes, diabetes, osteoporosis, hypertension, and mental health problems. The poor state of America’s health is a serious concern for Arnold, and he is constantly striving for ways to improve it. Arnold is an advocate ofRead MoreTraffic : The Post Modern Civil War1639 Words   |  7 Pagesofficers, which become entangled in the Mexican cartel war, during a drug bust of one of the cartels. The second story in the movie is about a conservative federal judge in Ohio who has been appointed by the President to the position of director of the Office of National Drug Policy, or the United States Drug Czar. The judge’s daughter is slipping into drug addiction during his turnover process. The third story is about two Drug Enforcemen t Agents that bust a dealer in the United States that is

Wednesday, January 1, 2020

Julius Caesar Essay - 1011 Words

Conflicting Perspectives Essay: As Roman Emperor Marcus Aurelius once suggested â€Å"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth†; embodying the notion that conflicting perspectives are held by different people towards both events and individuals. I believe that this common idea is held true in William Shakespeare’s production ‘Julius Caesar’, discussing the conflict between Brutus, Cassius and Antony, Richard Glover’s Sydney Morning Herald article ‘Take a Moment to Mourn the Mainstream’, debating against the depreciation of the respect over radio stations between generations, and Frank Capra’s classic film ‘Mr. Smith Goes to Washington’, which expresses the triumph of American ideals†¦show more content†¦The protagonist Brutus and his association with honour stands a key notion in Shakespeare’s ‘Julius Caesar’. After the assassination of Caesar, conflicting perspectiv es arise when Brutus suspects that Cassius has been dishonourable by taking bribes, â€Å"Cassius, you yourself/ are much condemned to have an itching palm.† In response Cassius retorts â€Å"I an itching palm?†, with an exclamatory tone, provoking a fight. Through the use of emotive language and sickness imagery, such as â€Å"corruption†, â€Å"bleed†, and â€Å"contaminate†, Brutus spells out his contempt towards such poor principles and his powerful closing lines â€Å"I had rather be a dog and bay the moon/ than such a Roman† cement this stance on the matter, whilst stating that he considers that his view on honour is the truthful viewpoint. Comparably, the related text of Frank Capra’s 1939 film ‘Mr. Smith Goes to Washington’ effectively represents the conflicting values of corruption and honour. Capra’s protagonist; the amateur senator ‘Jefferson Smith’ rises to express his knowledge that the scheme of a Deficiency Bill for a dam is fraudulent and that various corrupt congressmen are attempting to use it for their own profit; â€Å"A manShow MoreRelatedJulius Caesar Essay662 Words   |  3 PagesEnglish II November 30, 2011. Julius Caesar ´s Essay Julius Caesar is mostly known for his great leadership in Rome ´s Empire, he accomplished everything he purposed and he did whatever it took to make it happen. He had all it took to be such a leader; women were in love with him, men wanted to be part of his army and children wanted to be like him when they grow up. For Caesar all it took was courage and selfishness to get to where he was. A leader is a person who knows the way; goes theRead MoreEssay Julius Caesar931 Words   |  4 PagesJulius Caesar Expository Essay The decisions that one man makes can determine the length of life. Rome has many people that have the characteristics to be great leaders. Antony is a manipulative man, Brutus is an honorable man, and Octavius is a quiet strength. All three men would do an excellent job in leading Rome. Antony is a manipulative man. This is shown throughout the play in several cases, but most prominently at Caesar’s funeral. â€Å"I thrice presented him a kingly crown which he didRead More Julius Caesar Essay573 Words   |  3 Pages SUMMARY: Shakespeares Julius Caesar is the story of the resulting conflicts from the assassination of perpetual dictator and Roman emperor, Julius Caesar. A great friend of Caesar, Mark Antony, comes to the senate to see the dead body of their dictator. He pretends to not be angry at those who took part in the assassination, and asks to speak at his funeral, a request which he is granted. However, after the men leave, he begins a soliloquy in which he suggests that Caesars spirit will take revengeRead MoreEssay On Julius Caesar1650 Words   |  7 PagesIntroduction- Julius Caesar was a dictator of Rome in 47 BC, and then in 44 BC, he was appointed dictator for life.But really, who was Julius Caesar? Who is this man that was murdered because of his poor leadership? Some historians may believe that Julius Caesar did things that was for the benefit of Rome, and that he made Rome more powerful in a strong way. I understand why some people think that he was a good person, he did do things to benefit Rome. For one thing, he supposedly did give rightsRead MoreEssay on Julius Caesar951 Words   |  4 PagesEarly life Julius Caesar was born on July 13, 100 B.C. Though he was a descendent of the oldest patrician family, Julius Caesar grew up in a very poor district of Rome called Subura. As a child, he studied martial arts, history, and law (â€Å"Julius Caesar†). At the age of seventeen, Julius married Cornelia, the daughter of Luciussulla, who was a dictator of Rome. Because Luciussulla did not approve of the marriage, he tried to force the two to divorce, but they both refused. Julius Caesar studiedRead More Julius Caesar Essay1440 Words   |  6 PagesAnd Death of Gaius Julius Caesar In my opinion, no other man in the history of the world symbolizes military and political strength as much as Julius Caesar does. Caesar was born on July 12, 100 BC in Rome, Italy (Encarta 2000). His father belonged to the prestigious Julian clan (Internet Explorer) His uncle by marriage was Gaius Marius, leader of the Populares which supported agrarian reform and opposed the Optimates (Comptons Encyc lopedia). Marius saw to it that Julius Caesar was appointed flamenRead More Julius Caesar Essay1083 Words   |  5 Pagesgood king or ruler? Julius Caesar is one of the most famous rulers of all time. He was one of Rome’s greatest and most powerful leaders. His changes to the empire helped take Rome to new levels of success. The life of Caesar was short, yet great. It is important to learn about this great man and his many accomplishments. Gaius Julius Caesar was born on July 13th, 100 B.C. to a poor, Patrician family in Rome (â€Å"Julius Caesar†; Gruen 12). For most of his young life, Caesar lived in an apartmentRead More Julius Caesar Essay: Decision Making in Julius Caesar862 Words   |  4 Pages Decision Making in Julius Caesar nbsp; Making the right decisions is an ongoing struggle for man, because making decisions is never easy, and the wrong decision can lead to endless perils. Decisions must be made when dealing with power, loyalty, and trust. Yet, unlike other decisions, ones that are about these three fields are the most important, due to the risk involved, and because of the consequences that might follow. nbsp; Power- power is the complete domination of others, andRead MoreEssay on Julius Caesar578 Words   |  3 Pages How Betrayal Led to Downfall in Julius Caesar nbsp;nbsp;nbsp;nbsp;nbsp;In the play, The Tragedy of Julius Caesar, William Shakespeare shows how friends often betray each other. Julius Caesar is about to be crowned king of Rome, when some well-known Romans decide that it is not a good idea for this to happen. They form a conspiracy and kill Caesar. Brutus, an honorable Roman and a very good friend of Caesar’s, betrays Caesar by killing him for the good of Rome. Antony, Caesar’s best friendRead MoreJulius Caesar Essay1878 Words   |  8 PagesA friend of Caesar. Antony claims allegiance to Brutus and the conspirators after Caesar’s death in order to save his own life. Later, however, when speaking a funeral oration over Caesar’s body, he spectacularly persuades the audience to withdraw its support of Brutus and instead condemn him as a traitor. With tears on his cheeks and Caesar’s will in his hand, Antony engages masterful rhetoric to stir the crowd to revolt against the conspirators. Antonyâ⠂¬â„¢s desire to exclude Lepidus from the power