Adaptable Stream Processing

Total Page:16

File Type:pdf, Size:1020Kb

Adaptable Stream Processing A PROCRUSTEAN APPROACH TO STREAM PROCESSING by Nikolaos Romanos Katsipoulakis Bachelor of Science, National Kapodistrian University of Athens, 2011 Submitted to the Graduate Faculty of the School of Computing and Information in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2018 UNIVERSITY OF PITTSBURGH SCHOOL OF COMPUTING AND INFORMATION This dissertation was presented by Nikolaos Romanos Katsipoulakis It was defended on December 18th 2018 and approved by Dr. Alexandros Labrinidis, Department of Computer Science, University of Pittsburgh Dr. Panos K. Chrysanthis, Department of Computer Science, University of Pittsburgh Dr. John Lange, Department of Computer Science, University of Pittsburgh Dr. Andrew Pavlo, Department of Computer Science, Carnegie Mellon University Dissertation Advisors: Dr. Alexandros Labrinidis, Department of Computer Science, University of Pittsburgh, Dr. Panos K. Chrysanthis, Department of Computer Science, University of Pittsburgh ii Copyright © by Nikolaos Romanos Katsipoulakis 2018 iii A PROCRUSTEAN APPROACH TO STREAM PROCESSING Nikolaos Romanos Katsipoulakis, PhD University of Pittsburgh, 2018 The increasing demand for real-time data processing and the constantly growing data volume have contributed to the rapid evolution of Stream Processing Engines (SPEs), which are designed to continuously process data as it arrives. Low operational cost and timely delivery of results are both objectives of paramount importance for SPEs. Given the volatile and uncharted nature of data streams, achieving the aforementioned goals under fixed resources is a challenge. This calls for adaptable SPEs, which can react to fluctuations in processing demands. In the past, three techniques have been developed for improving an SPE’s ability to adapt. Those techniques are classified based on applications’ requirements on exact or ap- proximate results: stream partitioning, and re-partitioning target exact, and load shedding targets approximate processing. Stream partitioning strives to balance load among proces- sors, and previous techniques neglected hidden costs of distributed execution. Load Shedding lowers the accuracy of results by dropping part of the input, and previous techniques did not cope with evolving streams. Stream re-partitioning is used to reconfigure execution while processing takes place, and previous techniques did not fully utilize window semantics. In this dissertation, we put stream processing in a procrustean bed, in terms of the man- ner and the degree that processing takes place. To this end, we present new approaches, for window-based aggregate operators, which are applicable to both exact and approxi- mate stream processing in modern SPEs. Our stream partitioning, re-partitioning, and load shedding solutions offer improvements in performance and accuracy on real-world data by exploiting the semantics of both data and operations. In addition, we present SPEAr, the iv design of an SPE that accelerates processing by delivering approximate results with accu- racy guarantees and avoiding unnecessary load. Finally, we contribute a hybrid technique, ShedPart, which can further improve load balance and performance of an SPE. v TABLE OF CONTENTS PREFACE ......................................... xvii 1.0 INTRODUCTION .................................1 1.1 Challenges....................................2 1.1.1 Partitioning................................3 1.1.2 Load Shedding..............................4 1.1.3 Re-partitioning (Scale-out).......................5 1.2 Our Approach..................................5 1.2.1 Exact Stream Processing.........................6 1.2.2 Approximate Stream Processing.....................7 1.2.3 Combination of methods.........................7 1.3 Research Contributions.............................7 1.4 Road Map....................................8 2.0 BACKGROUND ..................................9 2.1 System Model..................................9 2.2 Query Model.................................. 11 2.3 Execution Plan Generation........................... 14 2.3.1 Logical Plan............................... 14 2.3.2 Physical Execution Plan......................... 15 2.4 Stateful Execution in a SPE.......................... 17 2.4.1 Tuple Arrival............................... 18 2.4.2 Watermark Arrival............................ 19 2.5 Result Approximation in Stream Processing................. 20 vi 2.5.1 Error Metrics............................... 21 2.5.1.1 Algebraic and Distributive:................... 22 2.5.1.2 Holistic:............................. 23 2.6 Experimental Infrastructure.......................... 23 2.6.1 Real-world datasets........................... 23 2.6.2 Storm Runtime.............................. 24 3.0 STREAM PARTITIONING ........................... 27 3.1 A new formulation for Parallel Stateful Operations.............. 27 3.2 Proposed partitioning cost model....................... 29 3.3 The pitfall of ignoring aggregation costs.................... 31 3.3.1 Partition Algorithm Taxonomy..................... 32 3.3.2 Mapping existing Partition Algorithms to each Category....... 32 3.3.2.1 Shuffle.............................. 32 3.3.2.2 Hash (or Field)......................... 33 3.3.2.3 Partial-Key............................ 34 3.4 Minimizing imbalance with low aggregation cost............... 34 3.4.1 Incorporating Cardinality in Partitioning................ 35 3.4.1.1 Incorporating Cardinality in measuring Imbalance...... 35 3.4.1.2 Incorporating Cardinality in Measuring Aggregation Cost.. 36 3.4.2 Cardinality Estimation data structures................. 37 3.4.2.1 Naive............................... 37 3.4.2.2 Hyperloglog........................... 37 3.5 Proposed Cardinality-aware Partitioning algorithms............. 38 3.5.1 Cardinality Imbalance Minimization (CM)............... 40 3.5.2 Group Affinity and Imbalance Minimization (AM & cAM)...... 40 3.5.3 Hybrid Imbalance Minimization (LM)................. 43 3.6 Experimental Setup............................... 44 3.6.1 Stream Partitioning Algorithms..................... 45 3.6.2 Data sets and Workloads........................ 45 3.7 Experimental Results.............................. 47 vii 3.7.1 Performance............................... 47 3.7.1.1 TPCH Query 1 (Figure 12)................... 48 3.7.1.2 TPCH Query 3 (Figure. 13- 14)................ 48 3.7.1.3 DEBS Query 1 (Figure. 15a- 15c)............... 49 3.7.1.4 DEBS Query 2 (Figure. 16a- 16c)............... 50 3.7.2 Scalability................................. 51 3.7.2.1 GCM Query 1 (Figs. 17& 18)................. 52 3.7.2.2 GCM Query 2 (Fig. 19)..................... 53 3.7.3 Partition algorithm cost......................... 53 3.7.3.1 Partition latency (Figure. 20a- 20c).............. 54 3.7.3.2 Partition Memory (Table4).................. 54 3.8 Discussion.................................... 55 3.9 Related Work.................................. 58 3.10 Summary.................................... 59 4.0 STREAM RE-PARTITIONING ........................ 60 4.1 Synefo: Elasticity in Storm........................... 60 4.1.1 Architecture Overview.......................... 61 4.1.1.1 Synefo Server.......................... 64 4.1.1.2 Synefo Spout........................... 65 4.1.1.3 Synefo Bolt............................ 66 4.1.2 Synefo Summary............................. 68 4.2 Unimico..................................... 68 4.2.1 Migration timestamp........................... 70 4.2.2 Stoping and resuming continuous queries................ 73 4.2.2.1 Stopping the query at the originating node.......... 73 4.2.2.2 Starting the query at target node............... 74 4.2.3 Experimental Evaluation......................... 75 4.2.3.1 Experimental Setup....................... 75 4.2.3.2 Simple CQ migration (Figures 28, 29, 30,& 31)....... 76 4.2.3.3 Complex CQ migration (Figure 32).............. 77 viii 4.2.4 UniMiCo Related Work......................... 78 4.2.5 UniMiCo Summary............................ 79 5.0 APPROXIMATE STREAM PROCESSING (WITHOUT GUARAN- TEES) ........................................ 82 5.1 Continuous Queries with Service Level Objectives.............. 82 5.2 The need for Load Shedding.......................... 83 5.2.1 Shortcomings of existing techniques................... 83 5.2.2 Concept Drift Evidence......................... 84 5.3 Concept Drift Definition............................ 85 5.4 Load Shedding................................. 87 5.4.1 Focal point of this work: what to shed................. 88 5.5 Existing Shedding Algorithms......................... 89 5.5.1 Normal Execution (Baseline)...................... 89 5.5.2 Uniform Shedding (State of the Art).................. 89 5.6 Concept-Driven Load Shedding Algorithm.................. 90 5.6.1 Designing CoD to eliminate overhead.................. 91 5.6.2 Implementation for different query types................ 93 5.6.2.1 Scalar User-Defined Aggregations............... 94 5.6.2.2 User-Defined Aggregations................... 94 5.6.2.3 Two-way Equality Joins..................... 94 5.7 Experimental Evaluation............................ 95 5.7.1 Experimental Setup........................... 95 5.7.2 Datasets.................................. 96 5.7.3 Experimental Results.......................... 97 5.7.3.1 Scalability (Figure 37)...................... 98 5.7.3.2 Performance (Figure 38).................... 98 5.7.3.3 Accuracy (Figure 39)...................... 99 5.7.3.4 Data Volume Reduction (Figure 40).............
Recommended publications
  • The Place of Archery in Greek Warfare
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, Classics and Religious Studies Department Classics and Religious Studies 2-1-1990 The Place of Archery in Greek Warfare Thomas Nelson Winter University of Nebraska-Lincoln, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/classicsfacpub Part of the Classics Commons Winter, Thomas Nelson, "The Place of Archery in Greek Warfare" (1990). Faculty Publications, Classics and Religious Studies Department. 9. https://digitalcommons.unl.edu/classicsfacpub/9 This Article is brought to you for free and open access by the Classics and Religious Studies at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Faculty Publications, Classics and Religious Studies Department by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Th e Place of Archery in Greek Warfare Th e Ancient Greek Archer: . at work & war by Tom Winter Summary: Despite the ancient Greek equivalent of an Agincourt, the Greek military mind fi rmly retained the heavy infantry, rather than the archers, as the main force. Recognized uses of the archer in Greek warfare were to fend off heights of city walls, to perform commando raids, and to provide covering fi re for commando-style operations. Th is essay, written after a fresh reading of the principle Greek historians, puts together all passages where one can see the ancient Greek archer at work and in his military setting. hen Pericles proclaims the catalog of Athenian forces at the Wbeginning of the Peloponnesian War (431–404), the array looked like this: 15,000 fi rst-line hoplites 1,600 reserve hoplites 1,600 cavalry (including mounted archers) 1,200 archers 300 warships Archers comprised, then, roughly 10 percent of an ancient Greek city’s military force.
    [Show full text]
  • Interpretation of Fiore Dei Liberi's Spear Plays
    Acta Periodica Duellatorum, Hands On section, articles 131 Interpretation of Fiore dei Liberi’s Spear Plays Jakub Dobi Ars Ensis [email protected] Abstract – How did Fiore Furlano use a spear? What is the context, purpose, and effect of entering a duel armed with a spear? My article- originally a successful thesis work for an Ars Ensis Free Scholler title- describes in detail what I found out by studying primary sources (Fiore’s works), related sources (contemporary and similar works), and hands-on experience in controlled play practice, as well as against uncooperative opponents. In this work I cover the basics- how to hold the spear, how to assume Fiore’s stances, how to attack, and how to defend yourself. I also argue that the spear is not, in fact, a preferable weapon to fence with in Fiore’s system, at least not if one uses it in itself. It is however, a reach advantage that has to be matched, and thus the terribly (mutually) unsafe situation of spear versus spear occurs. As a conclusion, considering context and illustrations of spear fencing, I argue that the spear is only to be considered paired with other weapons, like dagger, or sword. In fact, following Fiore’s logic, we can assume he used the spear to close the distance to use a weapon he feels more in control with. Keywords – Fiore, Furlano, Liberi, Italian, duel, spear, Ars Ensis I. PROCESS OF RESEARCH The article itself is largely devoted to trying to point out the less obvious points to make about this specific style of spear fencing.
    [Show full text]
  • Nicholas Victor Sekunda the SARISSA
    ACTA UNI VERSITATIS LODZIENSIS FOLIA ARCHAEOLOGICA 23, 2001 Nicholas Victor Sekunda THE SARISSA INTRODUCTION Recent years have seen renewed interest in Philip and Alexander, not least in the sphere of military affairs. The most complete discussion of the sarissa, or pike, the standard weapon of Macedonian footsoldiers from the reign of Philip onwards, is that of Lammert. Lammert collects the ancient literary evidence and there is little one can disagree with in his discussion of the nature and use of the sarissa. The ancient texts, however, concentrate on the most remarkable feature of the weapon - its great length. Unfor- tunately several details of the weapon remain unclear. More recent discussions o f the weapon have tried to resolve these problems, but I find myself unable to agree with many of the solutions proposed. The purpose of this article is to suggest some alternative possibilities using further ancient literary evidence and also comparisons with pikes used in other periods of history. 1 do not intend to cover those aspects of the sarissa already dealt with satisfactorily by Lammert and his predecessors'. THE PIKE-HEAD Although the length of the pike is the most striking feature of the weapon, it is not the sole distinguishing characteristic. What also distinguishes a pike from a common spear is the nature of the head. Most spears have a relatively broad head designed to open a wide flesh wound and to sever blood vessels. 1 hey are usually used to strike at the unprotected parts of an opponent’s body. The pike, on the other hand, is designed to penetrate body defences such as shields or armour.
    [Show full text]
  • Pikeman-Fact-Sheet.Pdf
    Pikeman Pikemen were foot soldiers (infantry) armed with a pike (a long wooden pole with a metal spear on the end). They were used to defend musketeers against the cavalry. They were also useful to push against the enemy when victory was in sight. They were often placed in the middle of the infantry, with musketeers on either side of them. Pikemen were trained to use a number of ‘postures’ or ways of handling the pike for different kinds of fighting. For instance, to defend against cavalry attack a pikeman would crouch down, brace the bottom of the pike shaft against his foot and point the head of the pike at the horse’s breast. When attacking another infantry regiment pikes would be held horizontally at shoulder height while the soldiers advanced towards the enemy. When contact was made each side would push until one gave way. Pikemen would have to practice these ‘postures’ in what was known as a ‘drill’ so that they could fight in a disciplined manner on the battlefield. A simple pike drill would be: 1. Shoulder your pike 2. Port your pike (hold your pike upright) 3. Advance your pike (pike dropped half way down) 4. Charge your pike ( pike facing your enemy, ready to charge) Pikemen could play a decisive role on the battlefield. For example, in June 1643, at the Battle of Adwalton Moor, the Royalist pikemen fought well, pushing their enemy back and creating gaps for the Royalist cavalry and cannons to destroy the left wing of the Parliamentarian army, and forcing them to retreat.
    [Show full text]
  • A Complete Tai Chi Weapon System
    LIFE / HEALTH & FITNESS / FITNESS & EXERCISE Recommended: a complete Tai Chi weapon system December 7, 2014 7:35 PM MST There are five major Tai Chi (Taiji) styles; Chen style is the origin. Chen Style Tai Chi has the most complete weapon system, which includes Single Straight Sword, Double Straight Sword, Single Broad Sword (Saber), Double Broad Sword, Spear, Guan Dao (Halberd), Long Pole, and Double Mace (Baton). Recently Master Jack Yan translated and published Grandmaster Chen Zhenglei’s detailed instructions on all eight different weapons plus Push Hands to English in two different volumes. View all 19 photos Chen Zhenglei Culture Jack Yan Grandmaster Chen is a 19th Generation Chen Family descendent and 11th Generation Chen Style Tai Chi Lineage Holder. He is sanctioned as the 9th Duan by the Chinese Martial Art Association the highest level in martial arts. He was selected as one of the Top Ten Martial Art Masters in China for his superb Tai Chi skills and in-depth knowledge. He has authored a complete set of books on Chen Style Tai Chi bare-hand and weapons forms. Master Jack Yan translated three other volumes on bare-hand forms. With these two new additions, all of Grandmaster Chen’s writings are accessible in English. Each of the Chen weapons has its features. Straight swords, sabers, and batons are short weapons while long pole, halberd, and spear are long weapons. Volume Four is for short weapons while Volume Five is for long weapons and Push Hands. Chen Style Single Straight Sword is one of the oldest weapon routines with forty-nine movements, tightly connected with specific and clear sword techniques, namely pierce, chop, upward-swing, hook, point, slice, lift, upward-block, sweep, cut, jab, push, and neutralize.
    [Show full text]
  • Knights at the Museum Interactive Qualifying Project Submitted to the Faculty of the Worcester Polytechnic Institute in Fulfillment of the Requirements for Graduation
    Knights! At the Museum Knights at the Museum Interactive Qualifying Project Submitted to the faculty of the Worcester Polytechnic Institute in fulfillment of the requirements for graduation. By: Jonathan Blythe, Thomas Cieslewski, Derek Johnson, Erich Weltsek Faculty Advisor: Jeffrey Forgeng JLS IQP 0073 March 6, 2015 1 Knights! At the Museum Contents Knights at the Museum .............................................................................................................................. 1 Authorship: .................................................................................................................................................. 5 Abstract: ...................................................................................................................................................... 6 Introduction ................................................................................................................................................. 7 Introduction to Metallurgy ...................................................................................................................... 12 “Bloomeries” ......................................................................................................................................... 13 The Blast Furnace ................................................................................................................................. 14 Techniques: Pattern-welding, Piling, and Quenching ......................................................................
    [Show full text]
  • 1 IQP-48-JLS-0062 Pikes for the People: an Interactive Pike
    1 IQP-48-JLS-0062 Pikes for the People: An Interactive Pike Demonstration Interactive Qualifying Project Proposal Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for graduation by _____________________________ _____________________________ Jotham Kildea Huan Lai _____________________________ _____________________________ Kevin McManus Matthew Sonntag February 14, 2010 _______________________________ Professor Jeffrey L. Forgeng. Major Advisor 2 Contents Abstract ................................................................................................................................ 4 Introduction .......................................................................................................................... 5 Acknowledgements: .............................................................................................................. 8 The Evolution of Military Organization and the Rise of Military Professionalism ................. 9 By Huan Lai ...................................................................................................................... 9 Technological Development and Its Effects on Warfare .............................................. 12 Medieval Military Strategies and Tactics ..................................................................... 15 Economic and Political Implications of Warfare in Medieval Europe .......................... 18 An overview of the historical context of war in Europe between 1500 and 1650. ................
    [Show full text]
  • Phalanxes and Triremes: Warfare in Ancient Greece by Ancient History Encyclopedia, Adapted by Newsela Staff on 08.08.17 Word Count 1,730 Level 1230L
    Phalanxes and Triremes: Warfare in Ancient Greece By Ancient History Encyclopedia, adapted by Newsela staff on 08.08.17 Word Count 1,730 Level 1230L A lithograph plate showing ancient Greek warriors in a variety of different uniforms. Photo from Wikimedia. In the ancient Greek world, warfare was seen as a necessary evil of the human condition. Whether it be small frontier skirmishes between neighboring city-states, lengthy city-sieges, civil wars or large-scale battles between multi-alliance blocks on land and sea, the vast rewards of war were thought to outweigh the costs in material and lives. While there were lengthy periods of peace, the desire for new territory, war booty or revenge meant the Greeks were regularly engaged in warfare both at home and abroad. Toward professional warfare The Greeks did not always have professional soldiers. Warfare started out as the business of private individuals. Armed bands led by warrior leaders, city militias of part-time soldiers provided their own equipment and may have included all the citizens of the city-state. Eventually, the conduct of warfare started to move away from private individuals and into the realm of the state. This article is available at 5 reading levels at https://newsela.com. In the early stages of Greek warfare in the Archaic period, training was haphazard. There were no uniforms or insignia and as soon as the conflict was over the soldiers would return to their farms. By the fifth century B.C, the military might of Sparta provided a model for all other states to follow.
    [Show full text]
  • Philip II, Alexander the Great, and the Rise and Fall of the Macedonian
    Epidamnus S tr Byzantium ym THRACE on R Amphipolis A . NI PROPONTIS O Eion ED Thasos Cyzicus C Stagira Aegospotami A Acanthus CHALCIDICE M Lampsacus Dascylium Potidaea Cynossema Scione Troy AEOLIS LY Corcyra SA ES Ambracia H Lesbos T AEGEAN MYSIA AE SEA Anactorium TO Mytilene Sollium L Euboea Arginusae Islands L ACAR- IA YD Delphi IA NANIA Delium Sardes PHOCISThebes Chios Naupactus Gulf Oropus Erythrae of Corinth IONIA Plataea Decelea Chios Notium E ACHAEA Megara L A Athens I R Samos Ephesus Zacynthus S C Corinth Piraeus ATTICA A Argos Icaria Olympia D Laureum I Epidaurus Miletus A Aegina Messene Delos MESSENIA LACONIA Halicarnassus Pylos Sparta Melos Cythera Rhodes 100 miles 160 km Crete Map 1 Greece. xvii W h i t 50 km e D r i n I R. D rin L P A E O L N IA Y Bylazora R . B S la t R r c R y k A . m D I A ) o r x i N a ius n I n n ( Epidamnus O r V e ar G C d ( a A r A n ) L o ig Lychnidus E r E P .E . R o (Ochrid) R rd a ic s u Heraclea u s r ) ( S o s D Lyncestis d u U e c ev i oll) Pella h l Antipatria C c l Edessa a Amphipolis S YN E TI L . G (Berat) E ( AR R DASS Celetrum Mieza Koritsa E O O R Beroea R.Ao R D Aegae (Vergina) us E A S E on Methone T m I A c Olynthus S lia Pydna a A Thermaic .
    [Show full text]
  • What May Philip Have Learnt As a Hostage in Thebes? Hammond, N G L Greek, Roman and Byzantine Studies; Winter 1997; 38, 4; Proquest Pg
    What may Philip have learnt as a hostage in Thebes? Hammond, N G L Greek, Roman and Byzantine Studies; Winter 1997; 38, 4; ProQuest pg. 355 What May Philip Have Learnt as a Hostage in Thebes? N. c. L. Hammond HE BELIEF that Philip did learn some lessons in Thebes was clearly stated in three passages.1 After denouncing the slug­ Tgishness of the Athenians, Justin (6.9.7) wrote that Philip "having been held hostage in Thebes for three years and having been instructed in the fine qualities of Epaminondas and Pelo­ pidas" was enabled by the inactivity of the Greeks to impose on them the yoke of servitude. The source of this passage was clearly Theopompus. 2 Justin wrote further as follows: "This thing [peace with Thebes] gave very great promotion to the outstanding natural ability of Philip" (7.5.2: quae res Philippo maxima incrementa egregiae indolis dedit), "seeing that Philip laid the first foundations of boyhood as a hostage for three 1 The following abbreviations are used: Anderson=J. K. Anderson, Military Theory and Practice in the Age of Xenophon (Berkeley 1970); Aymard=A. Aymard, "Philippe de Macedoine, otage a Thebes, REA 56 (1954) 15-26; Buckler=J. Buckler, "Plutarch on Leuktra," SymbOslo 55 (1980) 75-93; Ellis=J. R. Ellis, Philip II and Macedonian Imperialism (London 1976); Ferrill=A. Ferrill, The Origins of War from the Stone Age to Alexander the Great (London 1985); Geyer=F. Geyer, Makedonien bis zur Thronbesteigung Philippe II (Munich 1939); Hammond, Coll. St.-N. G. L. Hammond, Col­ lected Studies I-IV (Amsterdam 1993-97); Hammond, Philip=id., Philip of Macedon (London 1994); Hammond, "Training"=id., "Training in the Use of the Sarissa and its Effect in Battle, n Antichthon 14 (1980) 53-63; Hat­ zopoulos,=M.
    [Show full text]
  • Ancient Warfare Battle Manual Table of Contents 1
    Ancient Warfare Battle Manual Table of Contents 1. Introduction..................................................................................................................................... 1 2. The Game Interface ....................................................................................................................... 1 2.1. The Menus ...................................................................................................................... 1 2.2. The Toolbar..................................................................................................................... 6 2.3. The Status Bar ................................................................................................................ 8 3. The Units ........................................................................................................................................ 8 3.1. Definition of Unit Types :................................................................................................. 8 4. Commanding Your Forces ........................................................................................................... 10 4.1. Issuing Orders............................................................................................................... 10 4.1.1. Move ................................................................................................................... 11 4.1.2. Charge ...............................................................................................................
    [Show full text]
  • Alexander the Great Alexander the Great
    2 Alexander LEVELED BOOK • Z the Great A Reading A–Z Level Z2 Leveled Book Word Count: 2,266 Alexander Connections the Great Writing Research two kings who ruled Macedonia before Alexander. Write an essay comparing Alexander the Great to these kings. Social Studies Research more information about the customs of ancient Macedonia and Persia. Write an essay comparing the two cultures. Written by Jan C. Kraus Visit www.readinga-z.com for thousands of books and materials. www.readinga-z.com Words to Know Alexander ambitious flanked assassinated fleet botanists infantry the Great cavalry philosopher city-states regent ethics surveyors Front cover: Alexander the Great accepts the surrender of an enemy in India. Title page: A statue of Alexander the Great Page 3: Artwork shows Alexander training his horse named Bucephalus. Photo Credits: Front cover, page 19 (top right): © Granger, NYC; title page: © Mohamed Osama/123RF; page 3: © Universal Images Group/Universal Images Group/SuperStock; page 5: © Classic Image/Alamy Stock Photo; page 6: © robertharding/robertharding/SuperStock; page 7: © PanosKarapanagiotis/ iStock/Thinkstock; pages 12, 16, 19 (bottom left): © akg-images/Peter Connolly/ The Image Works; pages 13, 19 (bottom right): Alexander the Great at the Battle of Issus, Greek/Museo Archeologico Nazionale, Taranto, Puglia, Italy/© Mondadori Electa/Bridgeman Images; page 18: © 2317900 Ontario Ltd. Spirer/123RF; page 19 (top left): Rare Ancient Greek Coin, Gold Stater, Macedonia, Alexander the Great 336 BC/Hoberman/UIG/Bridgeman Images; page 19 (center left): The Taming of Bucephalus, McConnell, James Edwin/ Private Collection/© Look and Learn/Bridgeman Images Written by Jan C. Kraus www.readinga-z.com Alexander the Great World Leaders Focus Question Level Z2 Leveled Book Correlation © Learning A–Z LEVEL Z2 Written by Jan C.
    [Show full text]