Search This Blog

Monday, March 29, 2010

Lakewood Public Library Resume Guide for Internet Job-Hunting

Lakewood Public Library
Resume Guide for Internet Job-Hunting

A resume is a summary of your past jobs and the skills you have to offer an employer.

Content

1. At the top of your resume, list your name, city and state, phone numbers, and e-mail address. If you are job-hunting on the internet, don’t list your street address.
2. A section for EDUCATION will list your highest degree achieved first (i.e., bachelor’s degree, associate’s degree, high school diploma or GED), then other degrees or certifications.
3. A CAREER SUMMARY may be included. Highlight your experience using job-specific key words. If an employer does a search using a computer, industry terms, buzzwords, jargon, hard skills and commonly used trade terms are what they will look for. Do not use an OBJECTIVE.
4. An EMPLOYMENT section contains jobs you have held in the past. Most resumes use a chronological format to list jobs. Begin with the most recent job first, then list each job you have had in reverse chronological order. List the company name, address and when you worked there. Describe your job; include job title, department, key functions, computer hardware and software used, equipment used, foreign languages used – anything relevant to the target job.
5. VOLUNTEER WORK may be listed if you feel it is relevant to the job you are seeking.
6. Proofread carefully.
Formatting Your Resume

Keep it simple. Resumes are often e-mailed or scanned into a computer at a company’s headquarters. What looks good on paper may be a disaster when e-mailed or scanned. Resumes should be 1 or 2 pages.

1. Name ONLY on the top line. Address, phone numbers and e-mail address below
2. Text Only. Do not use graphics, bullets, fancy borders, pretty lines, or shading. Clean and graphically boring is better.
3. Choose a popular font such as Times, Palatino, Arial, Universal, Helvetica, or Bookman. The size should be 10-12 points.
4. Plain Text Only. Use ALL UPPERCASE letters for headings. NO italics or bolding. Never use underlining. Use white space to set off sections.
5. Save your resume in a word processing format. When you save your resume on a disk or flash drive, use your last name (first name optional) and the word Resume in the document name, i.e. JSmithResume.docx.
6. Save your resume again as a text document. After you save the Microsoft Word 2007 file (the extension will be .docx), select Save As from the Office Button menu and save the file again as a text document (the extension will be .txt). When you send your resume to a recruiter as an attachment, a text file is the safest way to ensure that the potential employer will be able to open it with no technical problems.

IRMA PARKER
Lakewood, Ohio

(216) 555-1212
jobhunter@lkwdpl.org
SUMMARY OF SKILLS AND EXPERIENCE

LAB TECHNICIAN--Highly skilled lab technologist with experience serving ER, Urgent Care, ediatric ER, and Stab-Room Trauma Unit. Processed cultures in microbiology, gram stains, urinalysis and various manual tests.

PHLEMBOTOMY--Inpatient and outpatient, pre-op and post-op, blood draws. Recognized for exceptional skill in serving hard-to-draw patients and children.
INSTRUMENT MAINTENANCE--Skilled in troubleshooting and maintenance of technical equipment.

TEACHING--Responsible for training staff on equipment operation and procedures.

QUALITY CONTROL--Maintained high quality standards with an emphasis on accuracy. aximized performance through organization, equipment testing, and procedures development.

EMPLOYMENT HISTORY

MEDICAL LABORATORY TECHNICIAN, ASCP
May 1995 to September 2006 Hennepin County Medical Center
*Increased lab efficiency through improved processing procedures, development of technical equipment, lab layout, and design.
*Maintained peak lab performance. Processed blood samples from Stab-Room Trauma Unit within two
minutes.

PHLEBOTOMIST
August 1989 to March 1995 Minneapolis Children’s Medical Center

EDUCATION

CERTIFIED: American Society of Clinical Pathologists
MEDICAL LABORATORY TECHNICIAN (GPA 3.5)
College of St. Catherine 1987

BIOLOGY/CHEMISTRY (117 credits)
Mankato State University 1985

UNITED STATES GOVERNMENT LEGENDS:Registered Trademarks

INTERNETWORKING
CONCEPTS GUIDE
http://www.3com.com/
Part No. 980-000076/001
Published: September 1997

3Com Corporation n 5400 Bayfront Plaza n Santa Clara, California n 95052-8145

© 3Com Europe Limited, 1997. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without
permission from 3Com Europe Limited.

3Com Europe Limited reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Europe Limited to provide notification of such revision or change.

3Com Europe Limited provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time.

UNITED STATES GOVERNMENT LEGENDS:

If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following restricted rights:

For units of the Department of Defense:

Restricted Rights Legend: Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) for Restricted Rights in Technical Data and Computer Software Clause at 48 C.F.R. 52.227-7013. 3Com Europe Limited, c/o Merchants’ House, Wilkinson Road, Cirencester, Gloucestershire, GL7 1YT United Kingdom.

For civilian agencies:

Restricted Rights Legend: Use, reproduction or disclosure is subject to restrictions set forth in subparagraph (a) through(d) of the Commercial Computer Software – Restricted Rights Clause at 48 C.F.R. 52.227-19 and the limitations set forth in 3Com Corporation’s standard commercial agreement for the software. Unpublished rights reserved under the copyright laws of the United States. If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard-copy documentation, or on the removable media in a directory file named LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you.

Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries.

3Com, AccessBuilder, Boundary Routing, EtherLink, NETBuilder, OfficeConnect and SuperStack are registered trademarks of 3Com Corporation. ServiceConnect is a trademark of 3Com Corporation.

AppleTalk, AppleShare, EtherTalk, LaserWriter, LocalTalk, Macintosh, and TokenTalk are registered trademarks of Apple Computer, Inc. Novell, NetWare and Yes NetWare are registered trademarks of Novell Inc. Windows, WIndows 95 and the Windows logo are registered trademarks of Microsoft Corporation. VT100 is a registered trademark of Digital Equipment Corporation. UNIX is a registered trademark, licensed exclusively through X/Open Company Ltd.

Other brand and product names may be registered trademarks or trademarks of their respective holders.

Environmental Statement:

It is 3Com's policy to be environmentally friendly in all its operations. This manual is printed on paper that comes from sustainable, managed European forests. The production process for making the pulp has a reduced AOX level (adsorbable organic halogen) resulting in elemental chlorine-free paper.

Internetworking Open System Interconnection Reference Model

CHAPTER

Chapter Goals

• Learn what makes up an internetwork.
• Learn the basics of the OSI model.
• Learn the differences between connection-oriented and connectionless services.
• Learn about the different types of addresses used in an internetwork.
• Learn about flow control and error-checking basics.
Internetworking Basics

This chapter works with the next six chapters to act as a foundation for the technology discussions that follow. In this chapter, some fundamental concepts and terms used in the evolving language of
internetworking are addressed. In the same way that this book provides a foundation for understanding modern networking, this chapter summarizes some common themes presented throughout the remainder
of this book. Topics include flow control, error checking, and multiplexing, but this chapter focuses mainly on mapping the Open System Interconnection (OSI) model to networking/internetworking
functions, and also summarizing the general nature of addressing schemes within the context of the OSI model. The OSI model represents the building blocks for internetworks. Understanding the
conceptual model helps you understand the complex pieces that make up an internetwork.

What Is an Internetwork?

An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures
that meet the challenge of creating and administering internetworks. Figure 1-1 illustrates some different kinds of network technologies that can be interconnected by routers and other networking devices to
create an internetwork.

1-58705-001-3

Internetworking Technologies Handbook

1-1

Chapter 1 Internetworking Basics


What Is an Internetwork?

Figure 1-1 Different Network Technologies Can Be Connected to Create an Internetwork

FDDI
Token
Ring
WANEthernet
History of Internetworking

The first networks were time-sharing networks that used mainframes and attached terminals. Such environments were implemented by both IBM’s Systems Network Architecture (SNA) and Digital’s
network architecture.

Local-area networks (LANs) evolved around the PC revolution. LANs enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources
such as file servers and printers.

Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity. Some of the technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL,
Frame Relay, radio links, and others. New methods of connecting dispersed LANs are appearing everyday.

Today, high-speed LANs and switched internetworks are becoming widely used, largely because they operate at very high speeds and support such high-bandwidth applications as multimedia and
videoconferencing.

Internetworking evolved as a solution to three key problems: isolated LANs, duplication of resources, and a lack of network management. Isolated LANs made electronic communication
between different offices or departments impossible. Duplication of resources meant that the same hardware and software had to be supplied to each office or department, as did separate support staff. This
lack of network management meant that no centralized method of managing and troubleshooting networks existed.

1-2
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Internetworking Challenges


Implementing a functional internetwork is no simple task. Many challenges must be faced, especially in the areas of connectivity, reliability, network management, and flexibility. Each area is key in
establishing an efficient and effective internetwork.

The challenge when connecting various systems is to support communication among disparate technologies. Different sites, for example, may use different types of media operating at varying speeds,
or may even include different types of systems that need to communicate.

Because companies rely heavily on data communication, internetworks must provide a certain level of reliability. This is an unpredictable world, so many large internetworks include redundancy to allow for
communication even when problems occur.

Furthermore, network management must provide centralized support and troubleshooting capabilities in an internetwork. Configuration, security, performance, and other issues must be adequately addressed
for the internetwork to function smoothly. Security within an internetwork is essential. Many people think of network security from the perspective of protecting the private network from outside attacks.
However, it is just as important to protect the network from internal attacks, especially because most security breaches come from inside. Networks must also be secured so that the internal network cannot
be used as a tool to attack other external sites.

Early in the year 2000, many major web sites were the victims of distributed denial of service (DDOS) attacks. These attacks were possible because a great number of private networks currently connected
with the Internet were not properly secured. These private networks were used as tools for the attackers.

Because nothing in this world is stagnant, internetworks must be flexible enough to change with new demands.

Open System Interconnection Reference Model

The Open System Interconnection (OSI) reference model describes how information from a software application in one computer moves through a network medium to a software application in another
computer. The OSI reference model is a conceptual model composed of seven layers, each specifying particular network functions. The model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered the primary architectural model for intercomputer communications. The OSI model divides the tasks involved with moving information
between networked computers into seven smaller, more manageable task groups. A task or group of tasks is then assigned to each of the seven OSI layers. Each layer is reasonably self-contained so that the tasks
assigned to each layer can be implemented independently. This enables the solutions offered by one layer to be updated without adversely affecting the other layers. The following list details the seven layers of
the Open System Interconnection (OSI) reference model:

• Layer 7—Application
• Layer 6—Presentation
• Layer 5—Session
• Layer 4—Transport
• Layer 3—Network
• Layer 2—Data link
• Layer 1—Physical
1-58705-001-3

Internetworking Technologies Handbook

1-3

Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Note A handy way to remember the seven layers is the sentence “All people seem to need data processing.” The beginning letter of each word corresponds to a layer.

• All—Application layer
• People—Presentation layer
• Seem—Session layer
• To—Transport layer
• Need—Network layer
• Data—Data link layer
• Processing—Physical layer
Figure 1-2 illustrates the seven-layer OSI reference model.
Figure 1-2 The OSI Reference Model Contains Seven Independent Layers

Network
Physical
Application
Presentation
Session
Transport
Data link

Characteristics of the OSI Layers

The seven layers of the OSI reference model can be divided into two categories: upper layers and lower layers.

The upper layers of the OSI model deal with application issues and generally are implemented only in software. The highest layer, the application layer, is closest to the end user. Both users and application
layer processes interact with software applications that contain a communications component. The term upper layer is sometimes used to refer to any layer above another layer in the OSI model.

The lower layers of the OSI model handle data transport issues. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical
network medium (the network cabling, for example) and is responsible for actually placing information on the medium.

Figure 1-3 illustrates the division between the upper and lower OSI layers.

1-4
Internetworking Technologies Handbook

1-58705-001-3


Chapter 1 Internetworking Basics

Open System Interconnection Reference Model

Figure 1-3 Two Sets of Layers Make Up the OSI Layers


Application

Data Transport

Network
Physical
Application
Presentation
Session
Transport
Data link
Protocols

The OSI model provides a conceptual framework for communication between computers, but the model itself is not a method of communication. Actual communication is made possible by using
communication protocols. In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. A protocol
implements the functions of one or more of the OSI layers.

A wide variety of communication protocols exist. Some of these protocols include LAN protocols, WAN protocols, network protocols, and routing protocols. LAN protocols operate at the physical and data link
layers of the OSI model and define communication over the various LAN media. WAN protocols operate at the lowest three layers of the OSI model and define communication over the various wide-area media.
Routing protocols are network layer protocols that are responsible for exchanging information between routers so that the routers can select the proper path for network traffic. Finally, network protocols are
the various upper-layer protocols that exist in a given protocol suite. Many protocols rely on others for operation. For example, many routing protocols use network protocols to exchange information between
routers. This concept of building upon the layers already in existence is the foundation of the OSI model.

OSI Model and Communication Between Systems

Information being transferred from a software application in one computer system to a software application in another must pass through the OSI layers. For example, if a software application in System
A has information to transmit to a software application in System B, the application program in System A will pass its information to the application layer (Layer 7) of System A. The application layer then
passes the information to the presentation layer (Layer 6), which relays the data to the session layer (Layer 5), and so on down to the physical layer (Layer 1). At the physical layer, the information is placed
on the physical network medium and is sent across the medium to System B. The physical layer of System B removes the information from the physical medium, and then its physical layer passes the
information up to the data link layer (Layer 2), which passes it to the network layer (Layer 3), and so on, until it reaches the application layer (Layer 7) of System B. Finally, the application layer of System B
passes the information to the recipient application program to complete the communication process.


1-58705-001-3

Internetworking Technologies Handbook

1-5

Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Interaction Between OSI Model Layers

A given layer in the OSI model generally communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked computer systems. The data
link layer in System A, for example, communicates with the network layer of System A, the physical layer of System A, and the data link layer in System B. Figure 1-4 illustrates this example.

Figure 1-4 OSI Model Layers Communicate with Other Layers

Application Application

Presentation Presentation

A B
Network
Physical
Session
Transport
Network
Physical
Session
Transport
Data link Data link
OSI Layer Services

One OSI layer communicates with another layer to make use of the services provided by the second layer. The services provided by adjacent layers help a given OSI layer communicate with its peer layer
in other computer systems. Three basic elements are involved in layer services: the service user, the service provider, and the service access point (SAP).

In this context, the service user is the OSI layer that requests services from an adjacent OSI layer. The service provider is the OSI layer that provides services to service users. OSI layers can provide services
to multiple service users. The SAP is a conceptual location at which one OSI layer can request the services of another OSI layer.

Figure 1-5 illustrates how these three elements interact at the network and data link layers.

1-6
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Figure 1-5 Service Users, Providers, and SAPs Interact at the Network and Data Link Layers

Service user
network layer protocol
Service provider
(data link layer protocol)
Data link
layer
Network
layer
Service user
network layer protocol
SAPs

OSI Model Layers and Information Exchange

The seven OSI layers use various forms of control information to communicate with their peer layers in other computer systems. This control information consists of specific requests and instructions that are
exchanged between peer OSI layers.

Control information typically takes one of two forms: headers and trailers. Headers are prepended to data that has been passed down from upper layers. Trailers are appended to data that has been passed
down from upper layers. An OSI layer is not required to attach a header or a trailer to data from upper layers.

Headers, trailers, and data are relative concepts, depending on the layer that analyzes the information unit. At the network layer, for example, an information unit consists of a Layer 3 header and data. At the
data link layer, however, all the information passed down by the network layer (the Layer 3 header and the data) is treated as data.

In other words, the data portion of an information unit at a given OSI layer potentially can contain headers, trailers, and data from all the higher layers. This is known as encapsulation. Figure
1-6 shows how the header and data from one layer are encapsulated into the header of the next lowest layer.


1-58705-001-3

Internetworking Technologies Handbook

1-7

Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Figure 1-6 Headers and Data Can Be Encapsulated During Information Exchange

System A Information units System B


Network
Data
Data
Data
DataHeader 4
Header 2
Header 3
Information Exchange Process

The information exchange process occurs between peer OSI layers. Each layer in the source system adds control information to data, and each layer in the destination system analyzes and removes the control
information from that data.

If System A has data from a software application to send to System B, the data is passed to the application layer. The application layer in System A then communicates any control information
required by the application layer in System B by prepending a header to the data. The resulting information unit (a header and the data) is passed to the presentation layer, which prepends its own
header containing control information intended for the presentation layer in System B. The information unit grows in size as each layer prepends its own header (and, in some cases, a trailer) that contains
control information to be used by its peer layer in System B. At the physical layer, the entire information unit is placed onto the network medium.

The physical layer in System B receives the information unit and passes it to the data link layer. The data link layer in System B then reads the control information contained in the header prepended by the data
link layer in System A. The header is then removed, and the remainder of the information unit is passed to the network layer. Each layer performs the same actions: The layer reads the header from its peer
layer, strips it off, and passes the remaining information unit to the next highest layer. After the application layer performs these actions, the data is passed to the recipient software application in
System B, in exactly the form in which it was transmitted by the application in System A.

OSI Model Physical Layer

The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems.
Physical layer specifications define characteristics such as voltage levels, timing of voltage changes,physical data rates, maximum transmission distances, and physical connectors. Physical layer
implementations can be categorized as either LAN or WAN specifications. Figure 1-7 illustrates some common LAN and WAN physical layer implementations.

1-8
Internetworking Technologies Handbook

1-58705-001-3


Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Figure 1-7 Physical Layer Implementations Can Be LAN or WAN Specifications

Data link
layer


EthernetIEEE 802.3100Base-TToken Ring/
IEEE 802.5FDDILAN
EIA/TIA-232
EIA/TIA-449

V.24 V.35
Physical

HSSI G.703

layer

EIA-530
X.21bis SIP

OSI layer

WAN

Physical layer implementations

OSI Model Data Link Layer

The data link layer provides reliable transit of data across a physical network link. Different data link layer specifications define different network and protocol characteristics, including physical addressing,
network topology, error notification, sequencing of frames, and flow control. Physical addressing (as opposed to network addressing) defines how devices are addressed at the data link layer. Network
topology consists of the data link layer specifications that often define how devices are to be physically connected, such as in a bus or a ring topology. Error notification alerts upper-layer protocols that a
transmission error has occurred, and the sequencing of data frames reorders frames that are transmitted out of sequence. Finally, flow control moderates the transmission of data so that the receiving device is
not overwhelmed with more traffic than it can handle at one time.

The Institute of Electrical and Electronics Engineers (IEEE) has subdivided the data link layer into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). Figure 1-8 illustrates the
IEEE sublayers of the data link layer.


1-58705-001-3

Internetworking Technologies Handbook

1-9

Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


Figure 1-8 The Data Link Layer Contains Two Sublayers

Data link
layer
LLC
sublayer

MAC
sublayer

The Logical Link Control (LLC) sublayer of the data link layer manages communications between devices over a single link of a network. LLC is defined in the IEEE 802.2 specification and supports
both connectionless and connection-oriented services used by higher-layer protocols. IEEE 802.2 defines a number of fields in data link layer frames that enable multiple higher-layer protocols to share
a single physical data link. The Media Access Control (MAC) sublayer of the data link layer manages protocol access to the physical network medium. The IEEE MAC specification defines MAC addresses,
which enable multiple devices to uniquely identify one another at the data link layer.

OSI Model Network Layer

The network layer defines the network address, which differs from the MAC address. Some network layer implementations, such as the Internet Protocol (IP), define network addresses in a way that route
selection can be determined systematically by comparing the source network address with the destination network address and applying the subnet mask. Because this layer defines the logical
network layout, routers can use this layer to determine how to forward packets. Because of this, much of the design and configuration work for internetworks happens at Layer 3, the network layer.

OSI Model Transport Layer

The transport layer accepts data from the session layer and segments the data for transport across the network. Generally, the transport layer is responsible for making sure that the data is delivered error-free
and in the proper sequence. Flow control generally occurs at the transport layer.

Flow control manages data transmission between devices so that the transmitting device does not send more data than the receiving device can process. Multiplexing enables data from several applications to
be transmitted onto a single physical link. Virtual circuits are established, maintained, and terminated by the transport layer. Error checking involves creating various mechanisms for detecting transmission
errors, while error recovery involves acting, such as requesting that data be retransmitted, to resolve any errors that occur.

The transport protocols used on the Internet are TCP and UDP.

OSI Model Session Layer

The session layer establishes, manages, and terminates communication sessions. Communication sessions consist of service requests and service responses that occur between applications located in
different network devices. These requests and responses are coordinated by protocols implemented at

1-10
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Open System Interconnection Reference Model


the session layer. Some examples of session-layer implementations include Zone Information Protocol (ZIP), the AppleTalk protocol that coordinates the name binding process; and Session Control Protocol
(SCP), the DECnet Phase IV session layer protocol.

OSI Model Presentation Layer

The presentation layer provides a variety of coding and conversion functions that are applied to application layer data. These functions ensure that information sent from the application layer of one
system would be readable by the application layer of another system. Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of
character representation formats, common data compression schemes, and common data encryption schemes.

Common data representation formats, or the use of standard image, sound, and video formats, enable the interchange of application data between different types of computer systems. Conversion schemes are
used to exchange information with systems by using different text and data representations, such as EBCDIC and ASCII. Standard data compression schemes enable data that is compressed at the source
device to be properly decompressed at the destination. Standard data encryption schemes enable data encrypted at the source device to be properly deciphered at the destination.

Presentation layer implementations are not typically associated with a particular protocol stack. Some well-known standards for video include QuickTime and Motion Picture Experts Group (MPEG).
QuickTime is an Apple Computer specification for video and audio, and MPEG is a standard for video compression and coding.

Among the well-known graphic image formats are Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG), and Tagged Image File Format (TIFF). GIF is a standard for
compressing and coding graphic images. JPEG is another compression and coding standard for graphic images, and TIFF is a standard coding format for graphic images.

OSI Model Application Layer

The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application.

This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically
include identifying communication partners, determining resource availability, and synchronizing communication.

When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit.
When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication exist. In synchronizing communication, all communication
between applications requires cooperation that is managed by the application layer.

Some examples of application layer implementations include Telnet, File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).


1-58705-001-3

Internetworking Technologies Handbook

1-11

Chapter 1 Internetworking Basics

Information Formats


Information Formats


The data and control information that is transmitted through internetworks takes a variety of forms. The terms used to refer to these information formats are not used consistently
in the internetworking industry but sometimes are used interchangeably. Common information formats include frames, packets, datagrams, segments, messages, cells, and data units.

A frame is an information unit whose source and destination are data link layer entities. A frame is composed of the data link layer header (and possibly a trailer) and upper-layer data. The header and
trailer contain control information intended for the data link layer entity in the destination system. Data from upper-layer entities is encapsulated in the data link layer header and trailer. Figure 1-9 illustrates
the basic components of a data link layer frame.

Figure 1-9 Data from Upper-Layer Entities Makes Up the Data Link Layer Frame

Frame

Data link layer
header
Upper layer
data
Data link layer
trailer
A packet is an information unit whose source and destination are network layer entities. A packet is composed of the network layer header (and possibly a trailer) and upper-layer data. The header and
trailer contain control information intended for the network layer entity in the destination system. Data from upper-layer entities is encapsulated in the network layer header and trailer. Figure 1-10 illustrates
the basic components of a network layer packet.

Figure 1-10 Three Basic Components Make Up a Network Layer Packet

Packet

Network layer
header
Upper layer
data
Network layer
trailer
The term datagram usually refers to an information unit whose source and destination are network layer entities that use connectionless network service.

The term segment usually refers to an information unit whose source and destination are transport layer entities.

A message is an information unit whose source and destination entities exist above the network layer (often at the application layer).

A cell is an information unit of a fixed size whose source and destination are data link layer entities. Cells are used in switched environments, such as Asynchronous Transfer Mode (ATM) and Switched
Multimegabit Data Service (SMDS) networks. A cell is composed

1-12
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

ISO Hierarchy of Networks


of the header and payload. The header contains control information intended for the destination data link layer entity and is typically 5 bytes long. The payload contains upper-layer data that is encapsulated in
the cell header and is typically 48 bytes long.

The length of the header and the payload fields always are the same for each cell.
Figure 1-11 depicts the components of a typical cell.

Figure 1-11 Two Components Make Up a Typical Cell

Cell

Cell header Payload
(5 bytes) (48 bytes)

53 bytes

Data unit is a generic term that refers to a variety of information units. Some common data units are service data units (SDUs), protocol data units, and bridge protocol data units (BPDUs). SDUs are
information units from upper-layer protocols that define a service request to a lower-layer protocol. PDU is OSI terminology for a packet. BPDUs are used by the spanning-tree algorithm as hello messages.

ISO Hierarchy of Networks

Large networks typically are organized as hierarchies. A hierarchical organization provides such advantages as ease of management, flexibility, and a reduction in unnecessary traffic. Thus, the
International Organization for Standardization (ISO) has adopted a number of terminology conventions for addressing network entities. Key terms defined in this section include end system (ES), intermediate
system (IS), area, and autonomous system (AS).

An ES is a network device that does not perform routing or other traffic forwarding functions. Typical ESs include such devices as terminals, personal computers, and printers. An IS is a network device that
performs routing or other traffic-forwarding functions. Typical ISs include such devices as routers, switches, and bridges. Two types of IS networks exist: intradomain IS and interdomain IS. An
intradomain IS communicates within a single autonomous system, while an interdomain IS communicates within and between autonomous systems. An area is a logical group of network segments
and their attached devices. Areas are subdivisions of autonomous systems (AS’s). An AS is a collection of networks under a common administration that share a common routing strategy. Autonomous systems
are subdivided into areas, and an AS is sometimes called a domain. Figure 1-12 illustrates a hierarchical network and its components.


1-58705-001-3

Internetworking Technologies Handbook

1-13

Chapter 1 Internetworking Basics


Connection-Oriented and Connectionless Network Services

Figure 1-12 A Hierarchical Network Contains Numerous Components

Autonomous
system
Area
Area
Area
IS
IS
IS
ES
Connection-Oriented and Connectionless Network Services

In general, transport protocols can be characterized as being either connection-oriented or connectionless. Connection-oriented services must first establish a connection with the desired service
before passing any data. A connectionless service can send the data without any need to establish a connection first. In general, connection-oriented services provide some level of delivery guarantee,
whereas connectionless services do not.

Connection-oriented service involves three phases: connection establishment, data transfer, and connection termination.

During connection establishment, the end nodes may reserve resources for the connection. The end nodes also may negotiate and establish certain criteria for the transfer, such as a window size used in
TCP connections. This resource reservation is one of the things exploited in some denial of service (DOS) attacks. An attacking system will send many requests for establishing a connection but then will
never complete the connection. The attacked computer is then left with resources allocated for many never-completed connections. Then, when an end node tries to complete an actual connection, there are
not enough resources for the valid connection.

The data transfer phase occurs when the actual data is transmitted over the connection. During data transfer, most connection-oriented services will monitor for lost packets and handle resending them. The
protocol is generally also responsible for putting the packets in the right sequence before passing the data up the protocol stack.

When the transfer of data is complete, the end nodes terminate the connection and release resources reserved for the connection.

Connection-oriented network services have more overhead than connectionless ones.
Connection-oriented services must negotiate a connection, transfer data, and tear down the connection, whereas a connectionless transfer can simply send the data without the added overhead of creating and
tearing down a connection. Each has its place in internetworks.

1-14
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Internetwork Addressing


Internetwork Addressing


Internetwork addresses identify devices separately or as members of a group. Addressing schemes vary depending on the protocol family and the OSI layer. Three types of internetwork addresses are
commonly used: data link layer addresses, Media Access Control (MAC) addresses, and network layer addresses.

Data Link Layer Addresses

A data link layer address uniquely identifies each physical network connection of a network device. Data-link addresses sometimes are referred to as physical or hardware addresses. Data-link addresses
usually exist within a flat address space and have a pre-established and typically fixed relationship to a specific device.

End systems generally have only one physical network connection and thus have only one data-link address. Routers and other internetworking devices typically have multiple physical network
connections and therefore have multiple data-link addresses. Figure 1-13 illustrates how each interface on a device is uniquely identified by a data-link address.

Figure 1-13 Each Interface on a Device Is Uniquely Identified by a Data-Link Address.

Interface

Network
Network
Network
A
B
C
A
A B
C D
A
Interfaces
End system
1 Interface
1 Data link layer
address
Router
4 Interfaces
4 Data link layer
addresses
D
MAC Addresses
Media Access Control (MAC) addresses consist of a subset of data link layer addresses. MAC addresses identify network entities in LANs that implement the IEEE MAC addresses of the data link layer. As
with most data-link addresses, MAC addresses are unique for each LAN interface. Figure 1-14 illustrates the relationship between MAC addresses, data-link addresses, and the IEEE sublayers of the data link
layer.


1-58705-001-3

Internetworking Technologies Handbook

1-15

Chapter 1 Internetworking Basics

Internetwork Addressing


Figure 1-14 MAC Addresses, Data-Link Addresses, and the IEEE Sublayers of the Data Link Layer Are
All Related

LLC
sublayer

MAC
sublayer

Data-link
addresses

MAC
addresses

MAC addresses are 48 bits in length and are expressed as 12 hexadecimal digits. The first 6 hexadecimal digits, which are administered by the IEEE, identify the manufacturer or vendor and thus comprise the
Organizationally Unique Identifier (OUI). The last 6 hexadecimal digits comprise the interface serial number, or another value administered by the specific vendor. MAC addresses sometimes are called
burned-in addresses (BIAs) because they are burned into read-only memory (ROM) and are copied into random-access memory (RAM) when the interface card initializes. Figure 1-15 illustrates the MAC
address format.

Figure 1-15 The MAC Address Contains a Unique Format of Hexadecimal Digits

24 bits 24 bits

Vendor

OUI

assigned

MAC address

Mapping Addresses

Because internetworks generally use network addresses to route traffic around the network, there is a need to map network addresses to MAC addresses. When the network layer has determined the
destination station’s network address, it must forward the information over a physical network using a MAC address. Different protocol suites use different methods to perform this mapping, but the most
popular is Address Resolution Protocol (ARP).

Different protocol suites use different methods for determining the MAC address of a device. The following three methods are used most often. Address Resolution Protocol (ARP) maps network
addresses to MAC addresses. The Hello protocol enables network devices to learn the MAC addresses of other network devices. MAC addresses either are embedded in the network layer address or are
generated by an algorithm.

Address Resolution Protocol (ARP) is the method used in the TCP/IP suite. When a network device needs to send data to another device on the same network, it knows the source and destination network
addresses for the data transfer. It must somehow map the destination address to a MAC address before forwarding the data. First, the sending station will check its ARP table to see if it has already discovered

1-16
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Internetwork Addressing


this destination station’s MAC address. If it has not, it will send a broadcast on the network with the destination station’s IP address contained in the broadcast. Every station on the network receives the
broadcast and compares the embedded IP address to its own. Only the station with the matching IP address replies to the sending station with a packet containing the MAC address for the station. The first
station then adds this information to its ARP table for future reference and proceeds to transfer the data.

When the destination device lies on a remote network, one beyond a router, the process is the same except that the sending station sends the ARP request for the MAC address of its default gateway. It then
forwards the information to that device. The default gateway will then forward the information over whatever networks necessary to deliver the packet to the network on which the destination device
resides. The router on the destination device’s network then uses ARP to obtain the MAC of the actual destination device and delivers the packet.

The Hello protocol is a network layer protocol that enables network devices to identify one another and indicate that they are still functional. When a new end system powers up, for example, it broadcasts hello
messages onto the network. Devices on the network then return hello replies, and hello messages are also sent at specific intervals to indicate that they are still functional. Network devices can learn the MAC
addresses of other devices by examining Hello protocol packets.

Three protocols use predictable MAC addresses. In these protocol suites, MAC addresses are predictable because the network layer either embeds the MAC address in the network layer address or uses an
algorithm to determine the MAC address. The three protocols are Xerox Network Systems (XNS), Novell Internetwork Packet Exchange (IPX), and DECnet Phase IV.

Network Layer Addresses

A network layer address identifies an entity at the network layer of the OSI layers. Network addresses usually exist within a hierarchical address space and sometimes are called virtual or logical addresses.

The relationship between a network address and a device is logical and unfixed; it typically is based either on physical network characteristics (the device is on a particular network segment) or on
groupings that have no physical basis (the device is part of an AppleTalk zone). End systems require one network layer address for each network layer protocol that they support. (This assumes that the device
has only one physical network connection.) Routers and other internetworking devices require one network layer address per physical network connection for each network layer protocol supported. For
example, a router with three interfaces each running AppleTalk, TCP/IP, and OSI must have three network layer addresses for each interface. The router therefore has nine network layer addresses. Figure
1-16 illustrates how each network interface must be assigned a network address for each protocol supported.


1-58705-001-3

Internetworking Technologies Handbook

1-17

Chapter 1 Internetworking Basics


Internetwork Addressing

Figure 1-16 Each Network Interface Must Be Assigned a Network Address for Each Protocol
Supported

OSI
network
address
AppleTalk
network
address
End system
Single
physical connection
TCP/IP
network
address
AT
OSI
IP
Router
Multiple
network layer addresses
Multiple
physical connections

OSI
IP
Hierarchical Versus Flat Address Space

Internetwork address space typically takes one of two forms: hierarchical address space or flat address space. A hierarchical address space is organized into numerous subgroups, each successively narrowing
an address until it points to a single device (in a manner similar to street addresses). A flat address space is organized into a single group (in a manner similar to U.S. Social Security numbers).

Hierarchical addressing offers certain advantages over flat-addressing schemes. Address sorting and recall is simplified using comparison operations. For example, “Ireland” in a street address eliminates
any other country as a possible location. Figure 1-17 illustrates the difference between hierarchical and flat address spaces.

1-18
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Internetwork Addressing


Figure 1-17 Hierarchical and Flat Address Spaces Differ in Comparison Operations
Hierarchical address space

Flat address space
A F
E
DC
B
A
A.B
A.A
A.C
A.A.C.a
A.A.C.b A.A.C.c
A.A.A
A.A.B
Address Assignments

Addresses are assigned to devices as one of two types: static and dynamic. Static addresses are assigned by a network administrator according to a preconceived internetwork addressing plan. A static address
does not change until the network administrator manually changes it. Dynamic addresses are obtained by devices when they attach to a network, by means of some protocol-specific process. A device using
a dynamic address often has a different address each time that it connects to the network. Some networks use a server to assign addresses. Server-assigned addresses are recycled for reuse as devices disconnect.
A device is therefore likely to have a different address each time that it connects to the network.

Addresses Versus Names

Internetwork devices usually have both a name and an address associated with them. Internetwork names typically are location-independent and remain associated with a device wherever that device moves (for
example, from one building to another). Internetwork addresses usually are location-dependent and change when a device is moved (although MAC addresses are an exception to this rule). As with network
addresses being mapped to MAC addresses, names are usually mapped to network addresses through some protocol. The Internet uses Domain Name System (DNS) to map the name of a device to its IP
address. For example, it’s easier for you to remember www.cisco.com instead of some IP address. Therefore, you type www.cisco.com into your browser when you want to access Cisco’s web site. Your
computer performs a DNS lookup of the IP address for Cisco’s web server and then communicates with it using the network address.


1-58705-001-3

Internetworking Technologies Handbook

1-19

Chapter 1 Internetworking Basics

Flow Control Basics


Flow Control Basics


Flow control is a function that prevents network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data. A high-speed computer, for example, may generate traffic faster
than the network can transfer it, or faster than the destination device can receive and process it. The three commonly used methods for handling network congestion are buffering, transmitting source-quench
messages, and windowing.

Buffering is used by network devices to temporarily store bursts of excess data in memory until they can be processed. Occasional data bursts are easily handled by buffering. Excess data bursts can exhaust
memory, however, forcing the device to discard any additional datagrams that arrive.

Source-quench messages are used by receiving devices to help prevent their buffers from overflowing. The receiving device sends source-quench messages to request that the source reduce its current rate of
data transmission. First, the receiving device begins discarding received data due to overflowing buffers. Second, the receiving device begins sending source-quench messages to the transmitting device at the
rate of one message for each packet dropped. The source device receives the source-quench messages and lowers the data rate until it stops receiving the messages. Finally, the source device then gradually
increases the data rate as long as no further source-quench requests are received.

Windowing is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted. With a window size of 3, the source
requires an acknowledgment after sending three packets, as follows. First, the source device sends three packets to the destination device. Then, after receiving the three packets, the destination device sends an
acknowledgment to the source. The source receives the acknowledgment and sends three more packets. If the destination does not receive one or more of the packets for some reason, such as overflowing
buffers, it does not receive enough packets to send an acknowledgment. The source then retransmits the packets at a reduced transmission rate.

Error-Checking Basics

Error-checking schemes determine whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination. Error checking is implemented at several of the OSI
layers.

One common error-checking scheme is the cyclic redundancy check (CRC), which detects and discards corrupted data. Error-correction functions (such as data retransmission) are left to higher-layer
protocols. A CRC value is generated by a calculation that is performed at the source device. The destinition device compares this value to its own calculation to determine whether errors occurred
during transmission. First, the source device performs a predetermined set of calculations over the contents of the packet to be sent. Then, the source places the calculated value in the packet and sends
the packet to the destination. The destination performs the same predetermined set of calculations over the contents of the packet and then compares its computed value with that contained in the packet. If the
values are equal, the packet is considered valid. If the values are unequal, the packet contains errors and is discarded.

1-20
Internetworking Technologies Handbook

1-58705-001-3



Chapter 1 Internetworking Basics

Multiplexing Basics


Multiplexing Basics


Multiplexing is a process in which multiple data channels are combined into a single data or physical channel at the source. Multiplexing can be implemented at any of the OSI layers. Conversely,
demultiplexing is the process of separating multiplexed data channels at the destination. One example of multiplexing is when data from multiple applications is multiplexed into a single lower-layer data
packet. Figure 1-18 illustrates this example.

Figure 1-18 Multiple Applications Can Be Multiplexed into a Single Lower-Layer Data Packet

Word
Spreadsheet processing

Another example of multiplexing is when data from multiple devices is combined into a single physical channel (using a device called a multiplexer). Figure 1-19 illustrates this example.
Figure 1-19 Multiple Devices Can Be Multiplexed into a Single Physical Channel

Data Data
channels channels

Source
Lower-layer header
Application data
User applications
Data
Physical
channel
Multiplexer Multiplexer
A
B
C
A
B
C
A multiplexer is a physical layer device that combines multiple data streams into one or more output channels at the source. Multiplexers demultiplex the channels into multiple data streams at the remote
end and thus maximize the use of the bandwidth of the physical medium by enabling it to be shared by multiple traffic sources.

Some methods used for multiplexing data are time-division multiplexing (TDM), asynchronous time-division multiplexing (ATDM), frequency-division multiplexing (FDM), and statistical
multiplexing.

In TDM, information from each data channel is allocated bandwidth based on preassigned time slots, regardless of whether there is data to transmit. In ATDM, information from data channels is allocated
bandwidth as needed by using dynamically assigned time slots. In FDM, information from each data channel is allocated bandwidth based on the signal frequency of the traffic. In statistical multiplexing,
bandwidth is dynamically allocated to any data channels that have information to transmit.


1-58705-001-3

Internetworking Technologies Handbook

1-21

Chapter 1 Internetworking Basics

Standards Organizations

Standards Organizations


A wide variety of organizations contribute to internetworking standards by providing forums for discussion, turning informal discussion into formal specifications, and proliferating specifications after
they are standardized.

Most standards organizations create formal standards by using specific processes: organizing ideas, discussing the approach, developing draft standards, voting on all or certain aspects of the standards, and
then formally releasing the completed standard to the public.

Some of the best-known standards organizations that contribute to internetworking standards include these:


International Organization for Standardization (ISO)—ISO is an international standards organization responsible for a wide range of standards, including many that are relevant to
networking. Its best-known contribution is the development of the OSI reference model and the OSI protocol suite.

American National Standards Institute (ANSI)—ANSI, which is also a member of the ISO, is the coordinating body for voluntary standards groups within the United States. ANSI
developed the Fiber Distributed Data Interface (FDDI) and other communications standards.

Electronic Industries Association (EIA)—EIA specifies electrical transmission standards, including those used in networking. The EIA developed the widely used EIA/TIA-232 standard
(formerly known as RS-232).

Institute of Electrical and Electronic Engineers (IEEE)—IEEE is a professional organization that defines networking and other standards. The IEEE developed the widely used LAN standards
IEEE 802.3 and IEEE 802.5.

International Telecommunication Union Telecommunication Standardization Sector (ITU-T)—Formerly called the Committee for International Telegraph and Telephone (CCITT),
ITU-T is now an international organization that develops communication standards. The ITU-T developed X.25 and other communications standards.

Internet Activities Board (IAB)—IAB is a group of internetwork researchers who discuss issues pertinent to the Internet and set Internet policies through decisions and task forces. The IAB
designates some Request For Comments (RFC) documents as Internet standards, including Transmission Control Protocol/Internet Protocol (TCP/IP) and the Simple Network Management
Protocol (SNMP).
Summary

This chapter introduced the building blocks on which internetworks are built. Under-standing where complex pieces of internetworks fit into the OSI model will help you understand the concepts better.
Internetworks are complex systems that, when viewed as a whole, are too much to understand. Only by breaking the network down into the conceptual pieces can it be easily understood. As you read and
experience internetworks, try to think of them in terms of OSI layers and conceptual pieces.

Understanding the interaction between various layers and protocols makes designing, configuring, and diagnosing internetworks possible. Without understanding of the building blocks, you cannot understand
the interaction between them.

1-22
Internetworking Technologies Handbook

1-58705-001-3


Chapter 1 Internetworking Basics

Review Questions


Review Questions


Q—What are the layers of the OSI model?

A—Application, presentation, session, transport, network, data link, physical. Remember the sentence “All people seem to need data processing.”

Q—Which layer determines path selection in an internetwork?
A—Layer 3, the network layer.
Q—What types of things are defined at the physical layer?
A—Voltage levels, time of voltage changes, physical data rates, maximum transmission distances,


physical connectors, and type of media.


Q—What is one method of mapping network addresses to MAC addresses?
A—ARP, Hello, predictable.
Q—Which includes more overhead, connection-oriented or connectionless services?
A—Connection-oriented.


For More Information

Cisco’s web site (www.cisco.com) is a wonderful source for more information about these topics. The Documentation section includes in-depth discussions on many of the topics covered in this chapter.

Teare, Diane. Designing Cisco Networks. Indianapolis: Cisco Press, July 1999.


1-58705-001-3

Internetworking Technologies Handbook

Wednesday, March 24, 2010

INTERNET DOWNLOADING SERVICES ARE ILLEGAL


I am a professional of media and communication in Harvard University. I came to know that many students are downloading music and films of the internet without paying for them. Their activities really discourage the artist who has created music and film with their great difficulties and toil but the students are irrational and immoral because they copied them for internet. It is not only their fault but it is also the fault of internet server which gives the service of downloading. Now a day, I see many students downloading music, film and some of them instead of studying, they spend their whole downloading. Internet service of downloading has really corrupted the students and it has discouraged and hurt the career of producer and artists. They just think of immediate benefit and hurriedly download. Now a day, not only in this university, but also in the university like Princeton, Holmes, Kent etc. downloading have become the fashion.
As a professional of media and communication in Harvard University, I would like to inform the administration of college/university and government. The government should make strict police for downloader. They should be fined. Likewise, the teacher and professor should teach the students its negative impact for artist. While persuading the students, they should teach the value of morality, norms and values. Similarly, internet station should not give their customers service of downloading.

Thursday, March 18, 2010

PRACTICE ON SEARCH ENGINE MARKETING

Search Engine Marketing (SEM) is concerning structure and maintain your website’s visibility inside the search engines from end to end the use of accepted organic optimization techniques as well as remunerated search (or sponsored record) campaigns.

SEM Objectives & Goals

· successful search marketing campaigns

· Accomplish senior organic rankings in search engine outcome pages (via SEO).

· Increase senior capable traffic amount most important to sales and leads (via PPC).

· Uphold a greater than before attendance in search that reinforces company branding labors and other Internet Marketing initiatives.

Having a rock-hard look for advertising policy

All in addition often, companies start on to optimize website pages and content in hopes of position senior in the natural search engine consequences or go on board on remunerated search campaigns only to obtain lost in the logistical and economic ins and outs of PPC. Successful search marketing requires accuracy development to make sure the two sides of the search band balance each other to get together your specific SEM objectives or to improve your in general online advertising policy.

For example, a PPC campaign might be initiated to lend a hand identify which higher-cost PPC conditions to aim within organic search optimization labors or it may be initiated as an alternative to serve as an instantaneous being there while in chorus commencement to optimize the position for the very matching keywords and phrases. Formative timelines, objectives, and conduct to measure your labors prior to opening any search marketing campaign will put aside you both moment in time and wealth.

Web Advantage Can Help

Web Advantage has been in search marketing, serving both B2B customers and B2C customers, generate and put into practice successful search marketing campaigns in view of the fact that 1998.

Monday, March 15, 2010

DIFFERENT DATA ENTRY ARTICLES POSTED

Time is money… everyone these days wish to earn a lot of money and utilize each and every second of the available time. So how can you earn extra money while at work or even at home via Online Data entry? Well… it has become a reality these days and the concept of freelancing is becoming increasingly popular among the masses. Now you can easily get work at home and get it done according to your timetable with no one acting as your boss. Wow! Sounds great… well the idea is fabulous and it is a true one. Now let me explain you with the whole idea of getting such work and how does the idea work. You can find many freelancing websites on the internet where you have to sign-up and get yourself registered. This sign-up is totally free so you do not have to pay a single penny for the registration. Registration is necessary because they need to have the basic information about you and your address etc so that they could send you your earned money. You have to write up your profile so that people can judge your abilities before giving you their work. Once you have completed the registration process, you can bid for the work that is available on the site. You can find different categories of work on the site including technical computer related work, data entry work and copy writing work etc. so if you are not a computer professional, even then you can get work that relates to data entry and copy writing. Once you have selected the work that you are willing to do, you have to place a bid in order to get it. at the start, the buyer (the one lending the work) will give the band in which he /she is ready to give the work to the successful freelancer. This band will have the minimum and the maximum amount that he/she is willing to pay for the project. So if project money describes $100-300, this means that the buyer is willing to pay up to a maximum of $300 and a minimum of $100 so he/she would prefer the one who has offered the lowest bid. Now you can bid for Data entry online jobs and make good money while sitting in your own home.

###########################################################

We have all seen the ads. Type Data Entry for dollars, Typing Simple Data Entry from home, Data Entry Income and more. Can Data Entry from home really earn real cash? If you are comfortable typing on a computer then Data Entry Jobs may be for you. There are misconceptions when doing data entry that you will be typing endlessly to earn nothing. The truth is data entry is an easy work at home job if you feel comfortable on the computer. If you can type at a good speed and be accurate this can be an easy source of income. Of course today with the tools available like spell check, grammar checks etc, it makes it a lot easier. In fact it's possible to earn over $40 per hour doing data entry jobs on line. Another misconception is that data entry jobs are scams. This is probably the "too good to be true" adverts with promises of overnight riches working from home. A few people will join a Data Entry program and think that the money will start flowing in. If it doesn't then they call the program a failure. Like most things in life, you won't get something for nothing. There are legitimate data entry work programs available. One simply needs to narrow down the field by choosing from the best programs available with a money back guarantee. When doing this it's a win - win situation. It's nice to know you have the protection if it's does not work out for you. It is not very expensive to get started in one of the programs so the risk / reward is very good in my opinion. So what do you have to do to get started? 1. Review the available Home Based Data Entry Programs 2. Narrow down the choices to 1-3 programs 3. Find out which ones have a money back guarantee 4. Use your charge card if possible for further protection 5. Sign up & start making money! It may be that it is simply not a good fit for you. Everyone has different skill sets, but you don't know if you don't try. Always remember that behind every successful person are a lot of small failures. You have to try to have a chance at success or failure. There is enormous potential in the data entry arena. There are many companies worldwide that outsource data entry. Many people are making $1000 - $3000 a month additional income. In order to get to this level of income it is important that you understand the skills that you'll need and where to look for data entry programs. As I mentioned earlier, you need to research the Top Data Entry programs and don't be afraid to give yourself a chance. The fee's to get your Home Based Data Entry Business going is very low in my opinion. Please feel free to visit my web page for product reviews. If you decide to try one of our programs, please let me know your opinion of the whole process. Your opinion is important to me. I also have a FREE Email Newsletter series, which gives you the Top Rated Programs. Michael Comeau has been owner of many successful businesses over the years including his current online business which can be viewed at http://www.workfromhome4dollars.com/ArticleDataEntry1.php You may also find more articles by Michael Comeau at http://www.workfromhome4dollars.com/Articles.php Article Source: http://EzineArticles.com/?expert=Michael_Comeau

###########################################################

The average weekly earnings of an individual doing data entry from home ranges between one to five thousand dollars per week depending on the amount of time spent typing. Like any position or job, earnings increase as the data entry from home worker gets more comfortable with the work and faster at entering data. The best part about home data entry opportunities is that most people are able to quit their 8-5pm jobs and work from home full time! Data entry is a field that is poised for steady growth as companies continue to reap the benefits of subcontracting this type of work out to individuals interested in doing data entry from home. Many companies from all types of industries are learning that they can pay a data entry worker very good money to work from the comfort of their home and they still save money by not having dedicated data entry staff members. Companies increase their efficiency and reduce their bottom line while allowing those looking for part-time or full-time work from home make great money. Thousands of people are already taking advantage of this wonderful opportunity. People just like you have figured out that making great money from home is not a pipe dream...it's a reality. Data entry from home opportunities is the perfect job opportunity for anyone who dreams of working from home while earning thousands of dollars a week! Getting started with a data entry opportunity is fairly simple and very affordable. You will need a computer, internet access, a basic printer and the desire to enter data. That's it! A couple of skills that will make you more valuable to companies seeking data entry workers are good writing, editing and proofreading skills. These are an added bonus that, if you can do them well, will only make you more money!!! What will you actually be doing? Typical tasks include, but are not limited to, typing basic transcripts, filling out simple marketing forms, PPC data entry, submitters, web researchers, paid survey takers, paid shoppers, paid drivers, paid email surfing jobs, telecommuting jobs and other entry level positions. The internet is growing each and every day and we've only begun to scratch the surface of what it can do and the jobs and opportunities it can provide. At its core, the internet is an income generating machine! Now is the time to take advantage of one of the best work at home opportunities on the web today - data entry from home. The earning potential with this type of opportunity is dependent on one thing: how much you want to work. You get to decide when you work, how long you work, how many days a week..You are your own boss! Data entry workers have the opportunity to experience limitless earning potential and earn thousands per week from the comfort of their home. What a sweet deal! By: The E-Profit Guys the E-Profit Guys are the founders and owner of the Ultimate Resource for Work at Home Opportunities on the internet www.guide2eprofits.com. To read reviews on data entry programs please visit our special Date Entry Reviews site. Or feel free to contact us!

ONLINE DATA ENTRY - EARN $6,000+ PER MONTH

Would you like to earn an extra $6,000 every month for just 1 – 2 hours of work per day? You could quit your job and make double the money at home working for yourself. Various Companies are currently looking for data entry workers worldwide to enter data online. Each of them Pay rates is excellent from $200 a day and up. They have over their current members earning extra money from the comfort of their own home. This is not a get-rich-quick scheme, but we can guarantee an income of $200 a day! If you want to make a good income working from home, keep reading...
You don't need any prior experience to work online entering data. Access to the Internet is all you need. You simply follow their step by step guide and work whenever & wherever you want for as long as you want. You will be in control of your own hours. The more you work, the more you can earn. They have many students, work from home moms, retirees, and many other men and women who are making a solid steady income. They teach you step by step how to earn a substantial income online!
Once you join, you will be given access to their member’s only area. The member’s area contains easy instructions on how to start making money entering data online. You will also be able to subscribe to a massive database of companies who need you to help enter data for them. It is easy to join each company and takes just a few seconds to register for your count. Every company in the catalog will accept your application to enter data for them and you can begin earning within minutes. You can access the database anytime and can control when you work. They provide you with everything needed to start entering data online. You will find both fee based and free opportunities and all are guaranteed to be legitimate.
Also, they can show you how to make even more money through our very simple Affiliate Marketing system. You simply submit forms through Google AdWords to make substantial money promoting various products online. The more forms submitted, the more money you can make!
A sample picture of a form is included on their site. It's simply 3 - 4 lines of information. They provide samples of the data needed along with easy to follow instructions. It's so easy, anyone can work entering data. Their program will also show you how many of our top members create a never ending stream of income, just by submitting forms online!
Anyone can do it - It really is easy! You simply sign up for a free Adwords account and submit the forms and watch your account grow as money adds up daily. These companies need people like you to enter data as it spreads word about their products helping them to generate sales. This is how they can pay you so much. They are splitting their profits with you. You will be paid via check, wire transfer or PayPal.

Friday, March 12, 2010

Article Marketing at a glance

Below is genuine list of content of this line. I determined to provide this course free to community to give every person possibility for improved living.
Niche Marketing with Great Articles
Hold On To Your Customers: Using Articles to Keep Them Coming Back
Higher Rankings through Private Label Articles
How to Use Article Directories to Increase Traffic
Closing the Sale: Articles as a Follow-Up
Building a Subscriber List with Articles
Be a Forum Star with Great Articles
Using Articles in Blogs
Using Articles and Affiliate Links
Articles and Link Exchanges
Getting Directed Traffic with Articles
Becoming Buddha: Make Yourself an Online Guru
Flog a Blog: A New Sales Device
Viral Marketing with Your Articles
Internet Automation Is Your Friend: Automated Submitters
Articles and Search Engine Placement
Article Directories Drive Traffic
Increasing Sales Conversion Rates with Articles
Articles and SEO
Prove you are an Expert in your Field with Articles
Drive Traffic with Fresh Content
Articles and Keywords
Articles: You’re Key to Internet Marketing Success
Search Engine Optimization: You’re Page Content
Finding Articles for Your Newsletters
Articles Boost Your Income
Demonstrate Your Expertise with Articles and EBooks
It's All About the Content: Generating Sales with Articles and Newsletters
Using Article Directories to Drive Traffic to Your Site
What's Wrong with Content Generators?
Using Clean Content Design to Improve Your Website Stickiness
Reap Traffic from Article Directories
Targeted Content Can Increase Affiliate Sales
Article Directories: Good Idea, or Dead End?
Why Use Keywords and Keyword Phrases?
Using Reports to Build Subscription Rates
Developing Newsletters with Private Mailing Lists
Maximize Your Search Engine Traffic with Great Articles
Advertiser-Supported Ezines - From Your Site
Using Private-Label Rights Articles to Enhance Your Business
Credibility, Trust, and Your Name at Stake
Why Should You Have Articles?
Using Squeeze Pages to Encourage Registration
Get Link Exchanges with Great Content
Why Do I Need Private Label Rights?
Articles and EBooks
Enhancing Site Traffic with Easy EBooks
Automated Web Publishing: Fresh Content Every Day
Viral E-Books
How Do Spiders Register Content?

Sunday, March 7, 2010

EARN AN INCOME ONLINE WITH EXECUTIVE HELP


In this recession, people are thinking of just about anything to break into the online world of business, make some money on the side, and see where it leads. Many people are skeptical, uninformed, ignorant and leery of embarking on this journey for independence and all belief is based on what they have heard. Statements like, "You can earn $1,000 a day" or "How I made $97,687 in 24 Hours" etc. And the list of claims goes on.
Now I am not saying this is impossible, but what I am stressing, is that this is not possible for the average person on the street. I define an average person as someone who does not have Internet Marketing experience, has not done any reading on Internet Marketing, has not studied under the direction of some self proclaimed Internet Guru, and has not sold anything online, not even through eBay. This is my definition of the average person, who has a job (or not) and sees the Internet as an information tool.
This average persons understanding and knowledge of Internet Business and Opportunities are influences by what they hear, group think and opinions of others. The messages that this average person hears either through advertising or social talk are as follows:
You can make millions on the internet; it's the new wild west of business.
Internet millionaires are made every day.
There are many scam artists online, that will rob you on your hard earned money without a flinch.
You have to start an e commerce store and sell something.
Affiliate marketing is what you should be doing to make money.
And the list goes on and on and on...
There are anywhere from 1000 to 10000 tales, legends, ideas for making money online, what you should be doing and what not etc. The average person is bombarded with messages about online opportunities and making real money online that it would be practically impossible to discern reality from fiction, honesty from thievery. I know how tough my start was and the hours I had to put into reading, listening, asking, making costly mistakes putting me more and more into a negative mindset about making money online. It becomes tiring to keep making mistakes, and at the same time be absolutely clueless about where to start, whether you're on the right path, whether you should change direction, how to measure progress etc. It can be very confusing and frustrating with all the opinions and conflicting or outdated information online.
The truth is this: To make real money online is really easy and really hard. It all depends on your knowledge and experience. If you don't have any knowledge, you won't know what opportunities to take, and won't spot any opportunities other than falling prey to Internet Marketers promising to make you thousands overnight. If you don't have any experience you won't know what to do, what to avoid or how to measure your success at a venture.
I was signing up to courses, programs and opportunities left, right and center. The frenzy was fueled by frustration and anticipation of the holy grail of internet marketing and the pursuit of the answer; how to really make money online.
Most internet marketers made good money off me, I got angry and started realizing that after 16 programs, costing between $30 and $150 each was more than I could afford to lose. I started realizing that anything cheap and nasty is most likely that; affordable for the masses, and useless information, or more information than instruction.
My salvation came through some rational thought and a hard look at the mistakes I had made. I had blown $1,500 on lots of information, which cost me more in time reading and absorbing, which time could have been better spent learning the real stuff. I decided to sign up to a program that made modest claims, stressed the need to work hard, learn and to my surprise, promised to instruct on a "winning formula". I had nothing more to lose, I signed up vouching that it would be my last.
I was pleasantly surprised to find the contact details of Executive Members that were available to help by getting on the phone or emailing. This was no useless information products or "education", but real hands on teaching, learning and application of what it takes, and what to do. The 'winning formula' is such a cliché online, but it is exactly that; the formula or methods you should use to make a success of your venture and really make money online. I invite you to visit 100KWorx and see what this is all about.
The truth is this, there is no quick road to success, but with the right education, instruction and application, it will make that road much as short as it can possibly be and making money becomes a reality. I am very grateful for one thing though; the instruction through audio, video and literature has helped me in more ways than anticipated. I have use this foundation to innovate and grow my strategies and methods to encompass many more businesses which I am in full control of. Come visit us at 100KWorx, - I would love to help you get started and make real money online, you deserve a real shot at it.

Work At Home Business Opportunities

Serving entrepreneurs since 2002 with honesty and integrity. Takeoffzone.com is professionally managed by a successful Internet marketing expert webmaster. He is committed to providing scam free business opportunity offers and related resources, which facilitate visitors with a better chance to find, evaluate and develop real and profitable home based businesses of their own. We also provide legitimate jobs listing, practical advices and personal support, that will definitely allow our clients to achieve a steady stream of income more quickly while working online.

Our website offers fresh and profitable work at home opportunities you can run online. No investment capital needed. Although some of the business opportunities and programs available will require you to pay either a relatively small one time payment, or a monthly membership fee after joining, they all carry a 100% money back guarantee. Thus others are completely free to join and participate.

Working from home to develop your own Internet business, and earning the money you deserve working part or full time, have never been so easy. It is possible to make enough money for a car payment, for example, or earn sufficient amount of money with the potential to surpass and replace your salary. Online businesses have exploded in recent years, commit yourself to claim a piece of this billions dollar pie today!

Hi all freelancers and Internet Marketers,

Just a quick post tonight to urge you to register for this emerging social network as quickly as possible. The 3 main reasons I feel so passionately about you registering for free are:


1) Grab your name or business name before someone else does. This happened with Facebook at the start where people just registered famous names with the view to selling them in the future. You only have to look at Michel Fortins post about Larry Winget at michelfortin.com to see how serious this problem can become.

2) I remember a couple of years back when Twitter was just starting out and a lot of people said what can you do with 140 characters or even worse what does it do. Back then I didn't know and I took advice, took the plunge and registered anyway. Boy, am I glad I did because I have learned so much and have met so many great people. It's now one of the 20 most visited sites on the internet.
According to Sales Letters that sell bestselling book by Drayton Bird every business goes through 3 stages:

*The first stage: it is new
*The second stage: other people are doing it
*The third stage: ferocious competition

This site is currently at latter stage 1 early stage 2. The Alexa ranking has gone from over 2,000 to 1,000 in the last six months. So get on board while it's emerging, because that's where the money is

3) You get paid to do what you normally do online. We all spend 20 minutes occasionally checking our spam box just incase we delete an important email. Why not get paid for getting a free email account and checking it once in a while. There are several other ways to get paid too including websearch, completing a survey and recieving direct mail.

Bid Prices by 95 PERCENT!

Why Your Bid Price is NOT the Actual Price You Pay - and the Huge Difference That Creates for You

What to Do When Your Keywords Get Labeled 'Inactive'

Today I'm going to talk about the thing that many newcomers find most confusing about Google - and I'm going to explain why it's a really ingenious twist that will actually help you.

The price you bid is almost never the price you actually pay. You almost always pay less.

First, it's a little bit like Ebay. You pay 1 cent above the position below you, not the maximum that you bid.

But there's an even more important secret that is the key to getting lower and lower prices, even while other bidders are jumping into the game:

Your Clickthrough Rate (CTR) is MORE important than how much you bid.

The Clickthrough Rate is the percentage of people searching who actually click. If 100 people search, your ad shows up 100 times, and one person clicks through, that's a 1% clickthrough rate.

So let's say I've got a 1% CTR and I'm paying $1.00 for position #2.

Let's say you've got a 2% CTR. If you play your cards right, you may only have to pay 51 cents to get position #2 and knock me down to position #3.

That means that you were 2 times as relevant, and you got to pay 1/2 as much!

The rules can be very simple, but the implications are huge.

When you achieve high click-thru rates, you can pull your bid prices down, down, down and yet stay at the same position on the page, while your traffic goes up.

The difference can be quite amazing. Here's an example of two ads - they are ALMOST IDENTICAL but one got nearly TWENTY TIMES the CTR as the other:

Notice what happened: All I did was reverse two lines - and the clickthrough rate jumped from 0.1% to 3.6%!

That means that the ad on the right gets more than TWENTY TIMES as much traffic - and I could pull down my bid prices and get that for the same amount of money as I was paying before. Just think how much money we'd be leaving on the table if we didn't discover this!

This is just one of dozens of tricks I've found that let you push your bid prices down, down, down while your traffic goes up. Beat your best, and you can get more and more traffic for less. I just explained how Google ranks your ad higher as your CTR goes up. Overture does not do this. On Overture, the highest bidder always wins. That rewards people who have more money than brains. Which means that for the smart marketer, Google is vastly superior! Before I go, there's one other thing I need to tell you: This is precisely the thing that gets people all tangled up over keywords that Google suddenly labels 'inactive.' While Google may tell you simply to bid more, the major reason that keywords get made 'inactive' is this: The message in the ad doesn't match what the person wanted when they typed in the keyword!

How do you fix this problem? By organizing your keywords into narrow themes and by testing different ads that match people's searches - like I described above. Then watch as people's clicks vote on the words that actually sell. This is an absolutely foolproof method of getting your ad placed higher on the page, and my Definitive Guide shows you dozens of variations on this method that you can use right away.

Tomorrow's tip is called:

"A Google AdWords Lesson from the Wall Street Journal"

Talk to you then.