Thursday, December 27, 2012

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

Intranet

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information. Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets. Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular. Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting. Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead. Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed. In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet. Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser. Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level. The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers. The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur. The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others. The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination. The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards. Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers. The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form. The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly. The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer. The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application. The application layer gets the data and performs, in this case, an HTTP request. The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network. The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer. On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer. The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network. The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet. Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet. A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised. Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free. Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems. Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access. One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.

Intranet
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Pawan Bangar, technical Director, Birbals, India.

www.birbals.com

www.seobirbals.com

www.hbirbals.com

www.ebirbals.com

pawan@ebirbals.com

Wednesday, December 19, 2012

Speak Clearly - The Top 7 Tricks to Instantly Improve the Clarity of Your Speech

"I'm sorry, what? I can't understand you." Have you ever heard this line? Then you probably know how embarrassing it can be to repeat something over and over again. Miscommunication can and will hold you back in today's fast-paced, international business environment. Too many people are hiding their gifts, talents and knowledge from the world due to a fear of speaking up and being misunderstood. Are you one of them?

Follow these simple tricks to instantly improve the clarity of your speech.

1) Slow Down

Speak Clearly - The Top 7 Tricks to Instantly Improve the Clarity of Your Speech

It is common sense, really; the faster you speak, the harder it is for your listener to understand. The easiest way to instantly increase the clarity of your speech is to simply slow down.

2) Pause

Pauses are effective little tools that can be employed in a number of situations. Use them to clearly separate sentences and when changing topics.

3) Speak Up

If you want to say something, really say it! Stand up straight, take a deep breath and speak on the exhale. Don't cover your mouth with your hands, a book or your notes. Make eye contact with your listeners and speak directly to them, not down to the floor or to your slides.

4) Articulate Word Endings

In our haste to get our messages out, we often times fail to enunciate word endings - the grammatical markers at the ends of words, such as the plural 's' or past tense 'ed.' If you don't articulate these sounds, it sounds like you're making very basic grammatical errors.

5) Use Clear Consonants

Here are a few examples of commonly confused consonant sounds: /b/ & /p/, /d/ & /t/, /g/ & /k/, /v/ & /f/. The first sound in each pair is voiced, whereas the second sound is voiceless.

Place your hand in front of your mouth while you say these pairs out loud:

gate/Kate

girl/curl

game/came

If you are articulating the /g/ and /k/ sounds correctly, you should feel an explosion of air when you make the /k/ sound.

6) Use Consistent Word Stress

To a native English speaker, a certain word stress is considered appropriate or inappropriate depending on where the person is from.

"Inappropriate" word stress can really rub listeners the wrong way because it deviates from their norm and indicates that the speaker is an "other" - an outsider. This can be quite FRUStrating (US)/frusTRATing (UK) for the non-native speaker who is just trying to get his point across.

"So which variety is correct?" I always recommend sticking to the form you are most comfortable with. Try to be consistent with whichever variety suits you best.

7. Speak Simply

Never use a long word where a short one will do. This is a common rule most people have heard, but unfortunately very few put it into practice. Your main goal in every spoken interaction should be to have your message understood. Do this by simplifying your vocabulary and using common English words.

Speak Clearly - The Top 7 Tricks to Instantly Improve the Clarity of Your Speech
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Heather Hansen, founder of Singapore-based Hansen Speech & Language Training, is an executive speech and language coach, writer and trainer. If you want to boost your linguistic abilities and become a powerful speaker, visit her website http://www.hansenslt.com now for free information on how to speak clearly, correctly and confidently! Join her mailing list to receive your free special report, Speak Clearly! and as a special bonus you’ll also receive her monthly newsletter, Speak like a Star!

Sunday, December 16, 2012

The Purpose of Public Speaking

From the days of the earliest storytellers, people have spoken to each other to convey common human experiences. Sharing these experiences brings together people from many different lifestyles and helps them to connect.

Every day, you are on the receiving end of public speaking. For the most part, you might not even be aware that someone is "doing" public speaking. The best speakers and presenters speak in a natural way that invites you to make some change in your life, no matter how small. There are four essential purposes of public speaking, listed below in random order:

1. To Entertain.
It seems that the best public speakers these days tend to be the comedians and storytellers who can make us laugh or touch our emotions. If you have good storytelling techniques, you can command the attention of any audience. As a public speaker, you can lift the spirits of your listeners through an entertaining presentation and still any of the items listed below as well.

The Purpose of Public Speaking

2. To Educate.
A well-prepared public speaker can help anyone of any age learn new ideas, concepts and skills. In formal settings such as schools, a good speaker moves students beyond "Do I hafta learn this?" to "I can't believe I learned so much!" Outside of learning institutions, there are many places for anyone to give great educational speeches such as community organizations and health-care institutions. Smart people of any age always want to learn and there is a place for you to teach with public speaking.

3. To Convince.
If you want someone to change his or her mind about a subject, then public speaking is the key to that change. While the Internet has brought us many ways to be in touch, the well-told story from an authentic speaker is still King in communication.

4. To Inspire.
While the "motivational speaker" may be a cliche that is abused on comedy shows, a person who is passionate about their topic and has coupled that with effective audience-reaching speaking skills can inspire both young and old to reach for something beyond themselves.

While most public speakers try to create positive messages, it is possible to fall into a fifth reason for speaking: to manipulate. When you speak, think about your goals and reason for speaking. Are you trying to build up your community and the people in it? Or, are you attempting to build up something or someone through false stories and lies? Be wary of manipulating your audience through your speeches.

Public speaking can be fun and educational for both your audience and you. Create some good presentations today.

The Purpose of Public Speaking
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Many people are nervous about public speaking, but a good coach and teacher can help you overcome that hurdle. The author, Sean Buvala, has been speaking about and training clients in the use of storytelling techniques for public speaking since 1986. Hundreds of companies and thousands of individual learners have experienced his work as a coach. He is the executive director of Storyteller.net and lives in Arizona.

For more information about Sean's two-day workshop that teaches you to harness the power of business, nonprofit and corporate storytelling, please visit our website at http://executivespeakingtraining.com/. To get Sean's free 30-lesson Ecourse, visit his site at http://www.seantells.com today.

Friday, December 7, 2012

Public Speaking - "Picture Them Naked" And Other Stupid Ways To Get Over A Fear Of Public Speaking

Nervous first-time public speakers have long been told a number of "creative" ways to help them get past the fear of public speaking. As a speech coach, communication consultant, and a professional speaker myself, I can tell you these creative bits of advice designed to help you get over being scared are not only stupid, but will likely hurt you and make you feel worse.

In no particular order, here are the three most common-- and stupidest --ways people say to get past feeling nervous. When you hear these, run from the other person and DO NOT TAKE ANY ADVICE FROM THEM!!! (sorry to yell).

1. "Picture them naked."

Public Speaking - "Picture Them Naked" And Other Stupid Ways To Get Over A Fear Of Public Speaking

This seemingly pornographic advice refers to imagining your audience in some position that lowers their perceived power. Other variations on this theme include, "Picture them in their underwear" and "picture them on the toilet." To all of these (and especially that last one about the loo), I say, "Ew." And how distracting! Not only do you have to remember your speech but now you have to visualize people in unflattering positions? No thank you. What's better? Visualize yourself delivering your speech calmly and confidently. And as for what to do with your audience? Look at them as people interested in hearing what you have to say and strive to make a connection with them.

2. "Instead of making eye contact look at their foreheads/chin."

Or "Look at the back of the room." (Really?) People do notice if you're not looking them in the eye. Unless you are in a large auditorium on a stage far removed from the audience, people will be able to tell if you are avoiding eye contact. And then they will not trust you and you will lose rapport quickly. Find people who seem genuinely interested in your presentation and speak to each one individually during your speech.

3. "Start off with a joke."

Only start your presentation with a joke if you are a priest delivering your Sunday homily or a comedian. Or-- if the joke is completely relevant to your speech. But if you feel nervous speaking to a group, it's not a good idea to lead off with humor. Starting with some random joke will only lower your credibility during the first 10 seconds when audiences are making their first impression of you. Then what if they don't laugh? Then you'll feeling more uncomfortable with your audience right off the bat. If they don't laugh, well now you're even more nervous because the first thing you planned bombed.

So what is the best way to get past your nerves? Practice and prepare.
Visualize your speech going exactly as you want it to go. And strive to make a connection with your audience by paying attention to them. Remember, delivering a speech is not about you -- it's about your audience and giving them what they want during your public speaking presentations.

Public Speaking - "Picture Them Naked" And Other Stupid Ways To Get Over A Fear Of Public Speaking
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Public speaking is one important way to increase your credibility as a small or home-based business owner. I invite you to discover how to Increase Business by Communicating Your Credibility now. You'll get this FREE e-course designed to help you attract more business and get more cash flow. Pick it up here: http://www.communicationtransformation.com/creating-credibility-ecourse.html

If you'd like to learn more about using public speaking to market your business, visit [http://www.CashInOnSpeaking.com] - You'll learn everything you need to know from how to choose a topic, how to best organize your speech to get instant results, and where to go to get booked to speak.

Felicia J. Slattery, M.A., M.Ad.Ed. is a communication consultant, speaker & coach specializing in training small and home-based business owners effective communication skills so they can see more cash flow now.

Monday, December 3, 2012

Public Speaking - Nonverbal Skills You Need to Create Positive Connections and Cash Flow

Public speaking is one of the most powerful ways to market your business and build a subscriber list. Anyone can give a good presentation with a little practice and by following the right formula. What makes a good presentation great is focusing on not only your language and content, but also on your nonverbal messages as well.

Essentially, nonverbal communication is anything that communicates meaning and a message that is not the words you choose. Depending on the source you consult, there are anywhere between 10 and 15 different forms of nonverbal communication. Because you only have 10 seconds to make a first impression, all forms of nonverbal communication are important. However, when we are working on developing a skill - any skill - it's best to focus on three main areas at a time. When we're talking about doing a face-to-face presentation, to any size group, the three forms of nonverbal communication you want to focus on are paralanguage (also known as vocalics), kinesics, and occulesics.

1. Your Voice, known as Paralanguage, is anything that comes out of your mouth that is not the words you choose. Focus on your tone of voice, volume, rate, pitch, and "sound effects" (think of an audible sigh, for example). When presenting to any size group you want to sound comfortable and confident about your topic, which will lead to increased credibility and ultimately increased sales for you. Avoiding "ums" and "ahs" will go a long way to showing your comfort with discussing your topic. When using your paralanguage effectively, people will see you as the expert you are and be much more willing to work with you as a result.

Public Speaking - Nonverbal Skills You Need to Create Positive Connections and Cash Flow

2. Your Body, known as Kinesics, is what is commonly known as body language and gestures. Focus on how you stand or sit, what you do with your hands and feet, and your body positioning relative to your audience. Keep your arms open and unfolded. When you're only meeting with one or two people, try a rapport-building technique known as"mirroring," where your body and gestures emulate those of your listeners. If they are sitting forward in their chairs, you should be sitting forward in your chair, too. Communication research has proven people are attracted to those most like them. Using this mirroring technique will send one more subconscious signal that you are like your listeners, and they will feel much more comfortable with you. When people are comfortable with you, they are more likely to do business with you.

3. Your Eyes, known as Occulesics, is communicating with your eyes. Simply stated, you absolutely must make comfortable and consistent eye contact with your audience for them to trust you. Don't look at the papers on the desk in front of you. Don't look over their heads or at the floor. Look your audience members, each one of them if possible, in the eye and smile. As with the other two forms of nonverbal communication, making eye contact will go toward building your credibility. Although most of us know people who try to deceive others while making good eye contact, on the whole we still get the general sense that if someone is looking us in the eye, s/he is honest. And showing your honesty is one quick way to more cash flow.

Because there are many forms of nonverbal communication functioning simultaneously, it's nearly impossible to think about controlling each one as they occur. However, careful attention to your voice, your body language and your eye contact will put you in the position you want to be in with your clients and prospects. You'll be seen as credible, trustworthy, and likeable - all the attributes you need to get more business and increase your cash flow.

Public Speaking - Nonverbal Skills You Need to Create Positive Connections and Cash Flow
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

And now I invite you to learn all the ways you can communicate your credibility and get more business as a result. Pick up your free e-course at: http://www.communicationtransformation.com/creating-credibility-ecourse.html

If you'd like to know more about putting together a speech to market your business, visit [http://www.CashInOnSpeaking.com] In this Signature Speech Home Study Program I show you the exact formula I use to get 90-100% conversion rates every time I speak. It's a simple step-by-step process. Plug in your info and you're set!

Not sure if you're coming across as confident? People are attracted to confidence. Learn how at: http://www.CommunicatingWithConfidence.com

Felicia J. Slattery, M.A., M.Ad.Ed., is a communication consultant, speaker & coach with more than a decade of experience teaching effective communication skills for massive success.

Saturday, December 1, 2012

Public Speaking: 9 Characteristics Of The Greats

There's more to speaking than sharing a few words. Here are the top nine characteristics of public speakers that you can use too

1. Solid Content. Even a person lacking charismatic gifts can develop solid content. Always share something the audience finds valuable to their lives.

2. Humorous. It's hard to hate someone you laugh with. The best speakers find a way to get people smiling early in the program. It opens hearts and makes the group receptive. You don't have to be hilarious, just humorous.

Public Speaking: 9 Characteristics Of The Greats

3. Organized. There's no excuse for rambling through a presentation. Have your notes structured in way that keeps you on pace and on target. Listeners should feel they received a message that made sense and was easy to remember.

4. Approachable. Some speakers try to get in and get out as fast as possible, but the audience likes to know the speaker is available an approachable. One of the best ways to make a good impression is to get to the event early and meet people as they come in.

5. Authenticity. It's said that honest arrogance is preferred over false humility. We all want to know people are being honest with us and that what we see is what we get. Be true to yourself and others by being the same around everyone. That way you don't feel like one person in front of an audience and another person at other times.

6. Growing. Great speakers continue to grow in the knowledge and application of the craft. They don't rest when reaching a particular level. Instead they continue to stretch and become better.

7. Giving. The best in this profession give without expecting return. Most big name speakers give anonymously to the charities and organizations they cherish. This giving attitude in private creates warmth and welcome in public.

8. Natural. Last night I actually watched BookSpan for the first time. I've flipped by before and mostly viewed it as a cure for insomnia. However, Walter Isaacson author of Benjamin Franklin An American Life was speaking. Having read the book I wanted to see how well he presented the material. He did a great job. I got the impression that he would be the same off the podium as he was in front of the microphone. A great example of natural expression.

9. Passionate. Speaking transfers energy with words. The more passion passes through the message the greater the chance of it being remembered and applied. No one has ever said, "I sure hope the speaker is boring." Instead they like to say things like, "Wow! She sure was excited about her message."

Public Speaking: 9 Characteristics Of The Greats
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection


Paul Evans is the creator of Great Public Speaking. He has helped over 30,000 speakers and presenters. http://www.GreatPublicSpeaking.com.

Tuesday, November 27, 2012

Public Speaking Topics - How to Choose a Great Topic For Your Speech

What is the importance of public speaking topics?

Let's start at the beginning. Do you have to give a speech? While it is a nerve-wracking prospect for most people, the good news is that if you come up with a great topic for your speech, which you can prepare well for, then the actual speech does not need to be something to dread.

Great public speaking topics makes it easier for you to relax and get into public speaking

Public Speaking Topics - How to Choose a Great Topic For Your Speech

It really is important to have a speech topic that you can get passionate about - or if not passionate then at least interested. This way you'll have more fun researching the speech and you will be able to relax into your interesting, informative speech topic and focus on the content of your speech rather than focusing on how nervous you are.

Persuasive speech topics

Do you need to give a persuasive speech - perhaps a sales speech, or narrative speech topics to a panel where you need to persuade the listeners over to your point of view? In these situations, the best possible speech topic to use is a story. Decide what your main points are, what you need to get across to your audience, and then for each point pick one or two stories that illustrate it.

People are not persuaded so much by facts as by emotion, and a great public speaking tip is to incorporate stories in order to make your speech much more persuasive.

Public speaking topics for groups

Are you just starting out in public speaking? Do you need to come up with interesting speech topics that you can present to a group but are not sure what topic to cover?

Here are some questions to ask that will help you choose the right speech topic for your audience - and for you, the speaker.

What is my audience interested in? What is the purpose of their group and what topics, that I could use in my speech, could relate to their purpose? What are the goals of my audience? Do they want to have a fun social evening, to achieve a business goal, to learn about something, to laugh? What are my goals for this speech? How can I relate my own goals to those of my audience?
Researching your speech topic - the key to success

When you have a great idea for a speech topic, researching it will be fun and easy. Here is the process I use for researching my own speech topics when preparing for a public speaking topic. You can follow my process or tailor it to one that will get YOU motivated and excited!

First I brainstorm my topic. I sit down with paper and some colored pens and let my imagination run riot. I jot down or sketch any and all ideas that come into my head that relate to my speech topic. Next, I go to my local library and immerse myself in the appropriate section that relates to my speech topic. I pull out books at random and browse them, jotting any ideas or useful facts that I come across down in my notebook. Finally, I set aside some quiet time to use the computer and write up my notes into speech form. Any extra research that I need to do at this stage, I use the Internet, being careful to take facts and figures only from reputable web sites.

Using these public speaking tips and your own imagination and thoughts, you are sure to come up with great public speaking topics!

Public Speaking Topics - How to Choose a Great Topic For Your Speech
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Do you know how many everyday things can make great public speaking topics? Visit Mags Squidoo Lens and find out.

Friday, November 23, 2012

3 Myths About Starting a Motivational Speaking Career and Business

Like in any industry, myths tend to precede real knowledge and it's time to debunk some of those false ways of thinking and false bits of information. Myths hurt any motivational speaking career because they often present themselves as barriers for a growing and thriving business.

People often ask me the same kinds of questions over and over - how to make more money with motivational speaking or how to get bookings for motivational speaking. What these people don't realize is that the answers to all of these questions come when they deal with the three myths listed below.

The first most common myth that people in a motivational speaking career have is that money is bad. As a result, these people inherently pick low paying speaking engagements or worse yet work for free because it's all they think they can attain. These are often the same people asking me how to get bookings for motivational speaking. Don't get me wrong. I'm not talking about the people who are using free speaking gigs as leverage to get their foot in the door or to build credibility and notoriety in their niche as an expert. I'm talking about the people who seem to think that money will eventually come despite not ever being paid a dime!

3 Myths About Starting a Motivational Speaking Career and Business

Here's what I learned. When I got serious about learning how to make money with motivational speaking, I decided to get "myself" out of the way. Once I got old ways of thinking and doing out of my motivational speaking career, I found that there were people who were willing to pay me a ton of money just to speak. That's the revelation I got and the revelation you need to receive today!

The second most common myth in motivational speaking I hear is that motivation is all you need. Wrong! I have an acronym that I teach people about that kind of thinking - MDPYM (Motivation doesn't pay your mortgage). One of the things I learned early in my speaking career is that just because I was motivated didn't mean I could pay my bills!

Now, I teach people to get rid of this kind of thinking because it simply doesn't do much for them. In fact, I teach the people I mentor to get motivated by finding different ways to get people to give them money. As they learn how to make money with motivational speaking they essentially learn to start the cycle of earning to help more and more people.

The last motivational speaking myth I hear most often is that one must work harder in order to make more money. Sorry folks! That kind of thinking is again wrong! My Dad was the hardest working man in my life but he never made more than ,000 annually. He was the model hard worker but did he have the kind of pay that matched his effort?

Then I learned about working smart which again, is only half of the picture. The other half of the picture is working right. The truth is that it doesn't matter how smart you work. If you're not working right, you're still off. In this motivational speaking industry, people often beat themselves silly trying to fulfill their egos instead of filling their pocketbook. I also often find people who don't have a clue about the kinds of needs that their target niche market has and as a result, they don't market themselves correctly in their niche.

Get your motivational speaking career off the ground by dealing with these three myths in your mind!

**Attn Ezine editors/Site owners**

Feel free to reprint this article in its entirety in your ezine or on your site as long as you leave all links in place. You may not modify the content and must include our resource box as listed above. You may sign up as an affiliate at BigMoneySpeaker.com and insert your affiliate links.

3 Myths About Starting a Motivational Speaking Career and Business
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

[http://www.GetSpeakingJobs.com] is where you can find over 100+ hours of downloadable audio and video lessons that will show you how to make 0,000 to ,000,000 dollars PER YEAR as a professional speaker.

James Malinchak, the author of this article can be your online business coach and mentor. Simply visit [http://www.GetSpeakingJobs.com] to get started today with several FREE professional speaking audio recordings.

Tuesday, November 20, 2012

The Most Popular Public Speaking Topics

There are quite a few public speaking topics that are extremely popular right now and there are others that have always kind of been popular, but aren't the latest or groundbreaking.

If you are looking for a popular public speaking topic for an upcoming speech, this article will be of great help to you. You can never go wrong if you talk about something that is very hot at the time. People tend to feel more comfortable speaking about popular subjects because they talk about them everyday anyway so it's not as hard talking to a group of people about it.

Some of the most popular public speaking topics are (in no particular order):

The Most Popular Public Speaking Topics

- Climate Change

- Global Warming

- Gas Prices

- Alternative Fuels

- Politics

- Presidential Campaign

- Obesity

- Olympics

- Sex Education

The public speaking topics list could go on and on forever. Giving a speech is all about relating to the audience, using appropriate language according to who they are, making points/arguments that are reasonable and have reliable sources to back them up!

That last one is an extremely important one, if you push your opinions on people or theories that have know proof or convincing evidence that it's true...you will lose interest and respect immediately. People don't always behave nicely towards people that make unreasonable arguments or outlandish statements.

Whatever your reason for wanting to find out more information about the most popular public speaking topics, I hope this article was helpful to you. There is a lot more information that you can learn about public speaking topics in general. Lots of people have lots of different opinions and often they conflict. A very important thing to consider is not only the topic, but what ABOUT the topic you discuss.

The Most Popular Public Speaking Topics
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Visit http://confident-public-speaking.net to get your FREE "Public Speaking Secrets" course now! Over 2900 people have taken this course and gone on to become public speaking superstars. Sign up for free.

Friday, November 16, 2012

The Writing Style of Hemingway

For Whom the Bell Tolls portrays the typical Hemingway characters and addresses the issues of machoism and womanizing. In this novel, as in many of his other works, Hemingway employs extensive use of what is known as the Hemingway Code. Numerous influences from various people and events from his personal life also had an effect on his writing.

Many people hold the opinion that there has been no American writer like Ernest Hemingway. A member of the World War I "lost generation," Hemingway was in many ways his own best character. Whether as his childhood nickname of "Champ" or as the older "Papa," Ernest Hemingway became a legend of his own lifetime. Although the drama and romance of his life sometimes seem to overshadow the quality of his work, Hemingway was first and foremost a literary scholar, a writer and reader of books. This is often overlooked among all the talk about his safaris and hunting trips, adventures with bullfighting, fishing and war. Hemingway enjoyed being famous, and delighted in playing for the public spotlight. However, Hemingway considered himself an artist, and he did not want to become celebrated for all the wrong reasons.

Hemingway was born in the quiet town of Oak Park, Illinois, a suburb of Chicago, on July 21, 1899. His father was a physician, and Ernest was the second of six children born to Dr. and Mrs. Clarence E. Hemingway. His mother, a devout, religious woman with considerable music talent, hoped that her son would develop an interest in music. Instead, Ernest acquired his father's enthusiasm for guns and for fishing trips in the north woods of Michigan (Lynn 63).

The Writing Style of Hemingway

From almost the beginning of his writing career, Hemingway employed a distinctive style which drew comment from many critics. Hemingway does not give way to lengthy geographical and psychological description. His style has been said to lack substance because he avoids direct statements and descriptions of emotion. Basically his style is simple, direct and somewhat plain. He developed a forceful prose style characterized by simple sentences and few adverbs or adjectives. He wrote concise, vivid dialogue and exact description of places and things. Critic Harry Levin pointed out the weakness of syntax and diction in Hemingway's writing, but was quick to praise his ability to convey action(Rovit 47).

Hemingway spent the early part of his career as a journalist. In 1937, he went to Spain to cover the Spanish Civil War for the North American Newspaper Alliance. After a few months in Spain, Hemingway announced his plan to write a book with the Spanish Civil War as its background. The result was For Whom the Bell Tolls.

The majority of his early novels were narrated in the first person and enclosed within a single point of view, however, when Hemingway wrote For Whom the Bell Tolls, he used several different narrative techniques. He employed the use of internal monologues(where the reader is in the "mind" of a particular character), objective descriptions, rapid shifts of point of view, and in general a looser structure than in his earlier works. Hemingway believed that "a writer's style should be direct and personal, his imagery rich and earthy, and his words simple and vigorous. The greatest writers have the gift of brevity, are hard workers, diligent scholars and competent stylists(Magill 1287).

For Whom the Bell Tolls is the most serious and politically motivated novel that Hemingway wrote. There are few comic or light episodes in the entire book. For Whom the Bell Tolls is an attempt to present in depth a country and people that Hemingway loved very much. It was an effort to deal honestly with a very complex war made even more complex by the beliefs it inspired(Gurko 127).

Common to almost all of Hemingway's novels is the concept of the Hemingway hero, sometimes known as the "code hero." When Hemingway's novels were first published, the public readily accepted them. Part of this acceptance was due to the fact that Hemingway had created a character whose response to life appealed strongly to those who read his works. The reader saw in the Hemingway hero a person whom they could identify with in almost a dream sense. The Hemmingway hero was a man's man. He moved from one love affair to another, he participated in wild game hunting, enjoyed bullfights, drank insatiably, he was involved in all of the so-called manly activities in which the typical American male did not participate(Rovit 56).

Hemingway's involvement in the war instilled him with deep-seated political views. For Whom the Bell Tolls is a study of the individual involved in what was a politically motivated war. But this novel differs greatly from Hemingway's prior portrayal of the individual hero in the world. In this book, the hero accepts the people around him, not only a few select members of the distinguished, but with the whole community. The organization of this community is stated with great eloquence in the quotation from one of the poet John Donne's sermons upon the death of a close friend. This is the quotation from which the book takes its title:

No man is an Iland, intire of it selfe, every man is a peece of the Continent, a part of the maine, if a Clod bee washed away by the Sea, Europe is the less, as well as if a Promontorie were, as well as if a Mannor of thy friends or of thine owne were; any mans death diminishes me, because I am involved in Mankinde; And therefore never send to know for whom the bell tolls; It tolls for I thee.

Therefore, while the hero retains the qualities of the Hemingway Code, he has been built up by his unity with mankind. In the end, he finds the world a "fine place," that is "worth fighting for"(Curly 795). In his personal confrontation with death, Robert Jordan realizes that there is a larger cause that a man can chose to serve. In this way he differs from the earlier Hemingway hero. The insistence that action and its form be solely placed on one individual is still present, along with the need for the character to dominate that action. However, this issue is not longer a single matador against a single bull, or an individual character against his entire environment. The person is the "instrument of mankind" against the horrors of war. The political issues of this book are therefore presented not as a "contrast of black and white, but in the shaded tones of reality"(Magill 491).

While Jordan is the epitome of the hero in his actions, he is also in command of himself and his circumstances to a far greater extent than Hemingway's previous heroes; he is driven to face reality by deep emotional needs. Jordan's drives in the novel seem to be a direct reflection of Hemingway's own, because Hemingway had also been deeply affected by the suicide of his own father (Kunitz 561). Ironically, suicide as an escape from reality is a violation of Hemingway's own code. The self-doubt and fear that such an act brings to the children of a person who commits suicide is a well-known psychological outcome. This is perhaps why the painfulness of their fears causes Hemingway's heroes to avoid "thinking" at all costs. For "thinking" too much may prevent a person from reacting. And without something to react to, the hero is left to face his inner fears (Magill 474). Death is also used by Hemingway at the end of the novel to resolve the dramatic conflicts established by the story. The theme of death is likewise observable in other parts of the book, such as when the characters express their concern about dying during the attack on the bridge. As in other works following the suicide of his father, Hemingway brings his characters face to face with death. He admires those who face death bravely and without expressing emotion. For Hemingway, a man does not truly live life until analyzes the significance of death personally(Brooks 323).

In contrast to the Hemingway heroes are his female characters. Hemingway's approach to women in his works is particularly masculine. They are seen and valued in relation to the men in his stories insofar as they are absolutely feminine. Hemingway does not go into their inner world except as this world is related to the men with whom they are involved. The reader comes to view them as love objects or as anti-love figures (Whitlock 231). Part of the reason Hemingway had this opinion of woman was because the way he viewed his mother. He believed his mother to be a manipulator and blamed her in part for the suicide of his father. "The qualities he thought admirable in a man-ambition, and independent point of view, defiance of his supremacy-became threatening in a woman"(Kert 103).

Hemingway's heroines almost always personify the physical appearance of the ideal woman in their beauty. But in their personality they appear as two types: the "all-woman" who gives herself entirely to the hero and the "femme fatale" who retains herself and prevents the hero from possessing her completely. The "all-woman" is acceptable in Hemingway view because she submits to the hero. She wants no other life than with him. By succumbing to the hero, she allows him to dominate her and affirm his manhood. The "femme fatale" is usually a more complex character than the "all-woman" (Lynn 98). While she may or may not be nasty, she does not submit to the hero and wounds him and all the men around her primarily because they can not manage her and thus can not assert their manhood through her. But despite Hemmingway's portrayal of women, he usually has them fall into the same basic category as the men. The heroine, like the hero, obeys the "Hemmingway Code." She sees life for what it is even as she longs for something more. She is basically courageous in life, choosing reality over thought, and she faces death stoically. In practically every case there has already been in her life some tragic event-the loss of a lover, violence-which has given her the strength to face life this way (Lynn 102).

For Whom the Bell Tolls "is a living example of how, in modern times, the epic quality must be projected" (Baker 132). Heroic action is an epic quality, and For Whom the Bell Tolls contains this element. The setting is simple and the emphasis is on the basic virtues of uncomplicated people. The men are engaged in the conflict are prepared to sacrifice their lives; they are exceptional for their deeds of daring and heroism (Baker 94).

Behind the conception of this idea of the hero lies the disillusionment of the American public, the disillusionment that was brought about by the First World War. The impressionable man came to realize that the old ideas and beliefs rooted in religion and ethics had not helped to save man the catastrophe of World War I. As a result, after the war came to an end, Hemingway and other writers began to look for a new system of values, a system of values that would replace the old attitudes which they thought proved to be useless. The writers who adopted these new beliefs came to be known as the "lost generation."

The "lost generation," was a name instituted by Gertrude Stein and it signified the postwar generation and the literary movement produced by the young writers of the time (Unger 654). Their writing reflected their belief that "the only reality was that life is harsh" (Bryfonski 1874).

A great deal has been written about Ernest Hemingway's distinctive style. Ever since he began writing in the 1920's, he has been the subject of lavish praise and sometimes savage criticism. He has not been ignored.

To explain Hemingway's style in a few paragraphs in such a manner as to satisfy those who have read his articles and books is almost impossible. It is a simple style, straight forward and modest. Hemingway's prose is unadorned as a result of his abstaining from using adjectives as much as possible. He relates a story in the form of straight journalism, but because he is a master of transmitting emotion with out embellishing it, the product is even more enjoyable.

The Writing Style of Hemingway
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

You may visit www.Bullshipper.com and www.TermPapersMadeEasy.com for instant access to over 45,000 plus term papers and essays. You may have all of these quality papers for only .95.