21
GCSE ICT – help with planning Unit 1 Teaching Block 5 Lesson Plans TB5 Lesson 4 – Connections for access Lesson objectives In this lesson students are learning about: the communication networks that support ‘access anywhere’ (e.g. Wi-Fi (Wireless Ethernet), Wi-Fi Direct, Infrared, Bluetooth) the protocols that support ‘access anywhere’ security measures to prevent access from certain locations (e.g. IP filtering) Lesson outcomes At the end of this lesson students will be able to: differentiate between methods of having ‘access anywhere’ recognise some of the commonly used communication protocols be aware of additional security measures when accessing online systems Specification coverage 1.5 methods of connecting devices (device to device, device to internet, device to peripherals) 2.7 commonly used communication protocols (VoIP, POP, IMAP, SMTP, HTTP/S) 3.2 the use of usernames, passwords and other security measures when accessing online systems Resources TB5 L4 R1.ppt TB5 L4 R2.doc TB5 L4 HW.doc Key vocabulary Wireless Ethernet Wi-Fi Direct Infrared/Bluetooth IP filtering VoIP POP IMAP SMTP HTTP/S Delivery notes key Italicised text is a note or instruction directly to the teacher Standard text is the essence of the delivery dialogue, from teacher to students document.doc Page 1 of 21

Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

TB5 Lesson 4 – Connections for accessLesson objectives

In this lesson students are learning about: the communication networks that support ‘access anywhere’ (e.g.

Wi-Fi (Wireless Ethernet), Wi-Fi Direct, Infrared, Bluetooth) the protocols that support ‘access anywhere’ security measures to prevent access from certain locations (e.g. IP

filtering)Lesson outcomes

At the end of this lesson students will be able to: differentiate between methods of having ‘access anywhere’ recognise some of the commonly used communication protocols be aware of additional security measures when accessing online

systems Specification coverage

1.5 methods of connecting devices (device to device, device to internet, device to peripherals)

2.7 commonly used communication protocols (VoIP, POP, IMAP, SMTP, HTTP/S)

3.2 the use of usernames, passwords and other security measures when accessing online systems

ResourcesTB5 L4 R1.pptTB5 L4 R2.docTB5 L4 HW.docKey vocabularyWireless Ethernet Wi-Fi DirectInfrared/BluetoothIP filtering

VoIPPOPIMAPSMTPHTTP/S

Delivery notes key Italicised text is a note or instruction directly to the teacher Standard text is the essence of the delivery dialogue, from teacher to students

document.doc Page 1 of 19

Page 2: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

Important note to teacher before the start of the lesson:

Note to teacher: throughout this lesson there are opportunities for some quick-fire discussions on various aspects of being connected to the Internet to facilitate ‘any time, anywhere’ access. This will enable you to build upon the knowledge the students already have on this subject and complement where appropriate.

It would be advisable to inform the students that it would be beneficial for them to take notes throughout the lesson on points that are new to them. They will require this information to complete the homework task and also for revision purposes. You could provide the students with the resource ‘Take note’ (TB5 L4 R2.doc) for this purpose.

Starter - Display TB5 L4 R1.ppt Slide 1

So far we have considered all sorts of digital devices that allow us to live ‘online’ any time, anywhere.

This living ‘online’ is, in essence, being connected to the Internet. Now if I was to ask you what the Internet conjures up in your mind, would it be… (mouse click)

Display TB5 L4 R1.ppt Slide 2Note to teacher: ask the students to give a show of hands as to whether they think of the Internet as being more like a cloud or a wire. Record the vote against each representation straight into the slide whilst in presentation mode using a keyboard or Interactive White Board.

Activity: class – voteA cloud or a wire? Let’s take a vote. All those who think of the Internet being like a cloud raise your hand. All those who think of the Internet being like a wire raise your hand.

document.doc Page 2 of 19

Page 3: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

Display TB5 L4 R1.ppt Slide 3

Before we go any further it would be useful to establish/clarify what the Internet is.

Activity: class – watch video ‘How the Internet works’

Note to teacher: click on the word ‘Internet’ to hyperlink to the video ‘ How the Internet Works’ (which can also be found at http://www.youtube.com/watch?v=7_LPdttKXPc ). T his short video explains very clearly what the Internet is. This will lay the foundation for this lesson on methods of connecting to the Internet and commonly used communication protocols.

Share lesson objectives

Display TB5 L4 R1.ppt Slide 4

Introduce the objective of this lesson and the outcomes to expect at the end

Lesson Objective:

In this lesson students are learning about:

• the communication networks that support ‘access anywhere’

• the protocols that support ‘access anywhere’

• security measures to prevent access from certain locations

Lesson Outcomes:

At the end of this lesson students will be able to:• differentiate between methods of having ‘access anywhere’• recognise some of the commonly used communication protocols• be aware of additional security measures when accessing online systems

Display TB5 L4 R1.ppt Slide 5From the video we have just watched we have identified that the Internet is in document.doc Page 3 of 19

Page 4: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

essence a ‘wire’.If we want to have connection to the ‘online’ world we have to connect to the Internet ‘wire’ in some way.All modern computers and laptops are capable of connecting to the Internet, as are many other devices, including mobiles, tablets, e-readers, televisions, video games consoles, etc.There are two ways of connecting to the Internet ‘wire’ at home. Can you tell me what they are?Note to teacher: allow time for student response. Depending on the responses, cover some or all of the information below:(mouse click)1) The most popular way of connecting to the Internet in our homes is to have the telephone line, also known as the ‘landline’, converted to broadband so that it can carry normal phone calls and Internet data at the same time.

(mouse click)2) If you don’t have a landline or if you want to be able to use the Internet when you’re out and about, you might prefer mobile Internet from one of the mobile network providers. This can be used anywhere there’s a mobile signal but does tend to be slower and more expensive than broadband through a landline.

Note to teacher: it is important at this point that the students realise that method one does not mean that they cannot be wireless within the home, but that the originating connection is being made from a land-based connection.Display TB5 L4 R1.ppt Slide 6

document.doc Page 4 of 19

Page 5: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

Note to teacher: this slide is for you to collect the group’s thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken.

Activity: class – discussion / knowledge base If we consider method one first, what are all the components or ‘bits’ that we will need to make the connection to the Internet ‘wire’?

Note to teacher: allow time for student response. Depending on the responses, cover some or all of the information below:

You will need:An internet service provider (ISP). This could be the company that provides the telephone line or it could be one of the many independent providers.

• The phone line converted to broadband• A router

• microfilter (one for each active phone line in the house. This splits the signal in the telephone wire in two: voice and broadband.)

• Cables:• a network cable to connect the router to your computer• a power cable• a cable that will go between your router and a microfilter

Display TB5 L4 R1.ppt Slide 7

Not that long ago you would have always had to have a network cable running from your PC or laptop to make the connection to the Internet.

But now most Internet providers supply wireless routers as standard, which means that can you have ‘Wi-Fi’ – a wireless broadband connection that allows you to connect to the Internet without using any cables. It’s particularly popular for use with laptops because they can then be used in any room of the house.document.doc Page 5 of 19

Page 6: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

(mouse click)

Which can bring a whole new meaning to ‘any time, anywhere’!

Display TB5 L4 R1.ppt Slide 8

There has been much debate on this matter, reliability and speed being the main concerns.

What would you vote for?

Note to teacher: move to the next slide to record the students’ votes.

Display TB5 L4 R1.ppt Slide 9

Activity: class – vote / discussion

Note to teacher: ask the students to give a show of hands as to which they think is better. Record the votes straight into this slide whilst in presentation mode using a keyboard or Interactive White Board.

To establish students’ knowledge on this subject, ask them to explain why they voted as they did.

Through the discussion ensure you cover aspects such as:

Wireless has improved significantly over the last few years with the introduction of Wireless Ethernet. This technology offers Ethernet speeds without the wires, with speeds similar to those of PCs hard wired to the network.

The speed that is indicated is ‘theoretical’ and is the speed on your local network. Most high-speed Internet connections range from 1Mbps to 25 Mbps. Even on faster Internet connections you're only approaching half of the full throughput of your document.doc Page 6 of 19

Page 7: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

wireless system.

For many the convenience of wireless by far outweighs any difference in transmission speed, but it can still be argued that wired will almost always be faster because you are hard wired and the connection is solid.

For Internet browsing though, you will not be able to tell the difference for the most part as wireless connections will support most home Internet connections just fine.If you are doing lots of streaming and file transfers, you might want to consider wired connections.

Further considerations are the area and where your wireless network is setup, and how many other wireless networks are in the area - latency and interference from other networks/devices. If you are gaming or using lots of streaming and need minimal latency, try to setup hard wired. If you are just surfing the web, 99% of the time you will not experience faster or slower Internet service between wired and wireless connections.

Display TB5 L4 R1.ppt Slide 10

Note to teacher: this slide is for you to collect the group’s thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken.

Activity: class – discussion / knowledge base

So if you want to go wireless within your home what are all the components or ‘bits’ that we will need to make the connection to the Internet ‘wire’?

Note to teacher: allow time for student response. Depending on the responses, cover some or all of the information below:

You will need:• Everything that you needed for the wired connection but the router will need

to be a wireless router• A computer with a built-in wireless adaptor or a separate adaptor

Display TB5 L4 R1.ppt Slide 11

document.doc Page 7 of 19

Page 8: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

As you will know Wi-Fi is also available in lots of public places such as cafés, hotels, trains and even some buses!

(mouse click)So as long as your device is wireless-enabled you can connect to the Internet while out having a coffee. This method of connecting devices uses a wireless local area network or WLAN.

Most digital devices that are currently available in shops come with a built-in Wi-Fi capability.

The place where you can use Wi-Fi to connect to the Internet is usually referred to as a Wi-Fi hotspot.

Every device, from laptop to smartphone, is going to have its own method of turning on the Wi-Fi and connecting to the Internet. For example on an Apple MacBook Pro, you simply click on a program and turn on Wi-Fi. Once the program is enabled, the computer’s software program begins searching for a Wi-Fi network to connect to. When you find an open network, you simple click on the name of the network and the computer automatically connects.

Wi-Fi networks can be open or closed. If they are free and open, you can connect without any cost or obligation. Sometimes hotels, airports, public buildings such as libraries, many restaurants and other places provide free Wi-Fi. You can even put an app on your smartphone that will look for free Wi-Fi access and tell you when a free network connection is available.

If there is not a free Wi-Fi connection, then there may be one for a fee or other charge. Some airports, for example, make money from selling Internet access to travellers and their connections cost a certain amount per hour or day.

Other Wi-Fi networks may be closed or private. Some may be semi-private. For example, when you check into a hotel, the hotel may have free Wi-Fi but only give you a password if you are a registered guest.

Wi-Fi is not much use if you are moving around a lot or in a vehicle or out in the country. Wi-Fi has a very limited range, hence the local area network designation. Most Wi-Fi connections outside your own private network are considerably slower than a direct high-speed Internet connection so if you have large files or programs to download, you may wish to wait until you have a direct Internet connection before starting the download.

document.doc Page 8 of 19

Page 9: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

When you use Wi-Fi out and about, what you are really doing is connecting your device to the Internet through a wireless router located nearby (e.g. in a coffee shop, on a train, etc.)

But what if you really want to have access ‘any time, anywhere’?

Note to teacher: mouse click on the oval highlighting the dongle at the side of the laptop, and a text box will animate to display the text ‘Mobile Internet connection via a dongle’. You could discuss this method of connection further with the students.*Mouse click on the oval again to hide the text box before moving on.

Mouse click to reveal an image of man using laptop on a park bench (which represents ‘any time anywhere’ access to the Internet).

Note to teacher: move to the next slide to record the students’ responses.

Display TB5 L4 R1.ppt Slide 12

Note to teacher: this slide is for you to collect the students’ thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken.

Activity: class – discussion / knowledge base

Note to teacher: encourage the students to provide various options for connecting to the Internet while on the move, not only with a laptop but through other devices too.

Note, through the discussion ensure you cover aspects such as:document.doc Page 9 of 19

Page 10: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

The mainstay of mobile computing has been the portable computer or laptop. But now there are additional options in tablet computers, smartphones, and various Apple technologies too.

Consider appropriateness of the device… you should also consider whether or not you will be entering data into the device. A laptop is a lot more convenient for entering data than a smartphone, but the laptop is also larger and much heavier.

Tablet computers are becoming a compromise between smartphones and full-blown laptop computers, but you must still take into account the ease of entering data into the device.

Since Wi-Fi is useful only at very short distances, if you want a more reliable and wide ranging connection, you will have to pay for a wireless Internet connection. Most mobile phone providers also sell devices that use the mobile phone system to connect to the Internet and create a hotspot for additional devices such as smartphones, tablets or laptops.

Almost all smartphones come with a data plan from the service provider where you pay for a certain amount of Internet activity every month with surcharges for going over the limit. Those who own smartphones use Wi-Fi connections to avoid using up their allocation of paid access time.

If you want to connect your laptop, smartphone or tablet directly to the Internet, you can do so with a wireless Internet device – this can be an external dongle or an internally installed wireless-enabled SIM card. This type of connection is called a mobile broadband Internet connection. These devices connect your device directly to the Internet. Some tablet computers and all smartphones come with this capability built in but in every case you have to pay for the connection on a daily, weekly or monthly basis.

Display TB5 L4 R1.ppt Slide 13

Considering Wi-Fi a little further and the fact that the world is falling out of love with cables, if you can use Wi-Fi to connect to the Internet can you use it to connect to other digital devices?

For example, you might want to print from your laptop or smartphone to a wireless printer, or to share images with someone else in the same room, or to transmit video from your phone to your TV. None of these things requires an Internet connection, but they do need to connect to the printer, or to the other person's hardware, or to the TV.

Has anybody heard of or used Wi-Fi Direct? (mouse click)

document.doc Page 10 of 19

Page 11: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

Activity: class – watch short video

Note to teacher: allow time for the students to respond, then watch the short animation.

The image is hyperlinked to: http://www.youtube.com/watch?feature=player_embedded&v=je2lWjfpywQ

After watching the video continue the discussion, ensuring you build on students’ existing knowledge, and covering the information below:

Wi-Fi Direct is Wi-Fi without the Internet bit, taking simple tasks and providing simple connections.

But Wi-Fi Direct can have the Internet bit too if you have a Wi-Fi router connected to the Internet.

Wi-Fi Direct doesn't need a wireless access point as Wi-Fi Direct devices can connect to each other without having to go through an access point: they can establish ad-hoc networks as and when required, letting you see which devices are available and choose which one you want to connect to. If that sounds very like Bluetooth, that's because it is.

Wi-Fi Direct uses Wi-Fi Protected Setup to prevent unauthorised connections and keep your communications private. There are two ways to establish a connection: with physical buttons – ‘press the button on gadget X and then the same one on gadget Y’, or with PIN codes.

Display TB5 L4 R1.ppt Slide 14

So if you can utilise a connection method first intended for connecting a device to the Internet to then connect other digital devices to each other could this be done vice versa?

Digital devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams. In essence many of our digital devices talk to each other, so could we also use one of these methods to connect/talk to the Internet? (mouse click)

document.doc Page 11 of 19

Page 12: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

There are ways of doing this, and this is known as ‘piggybacking’.

Activity: class – discussion / knowledge base

Note to teacher: ask the students if they have heard of this or have and any experience of this method of connecting to the Internet.

(mouse click)BluetoothNote to teacher: after the initial student responses continue the discussion, ensuring you build on students’ existing knowledge, and covering the information below:

Using a Bluetooth-enabled mobile phone as a modem for Internet access on a laptop is a good alternative when there's no Wi-Fi service available or your regular Internet service goes down.

The main benefit of using Bluetooth instead of a USB cable for tethering or ‘piggybacking’ is that you can keep your mobile phone in your bag or pocket and still make the connection.

In essence you can use a 3G phone as a Bluetooth modem, based on basic Bluetooth paring.All you need is:

• Bluetooth-enabled mobile phone• Bluetooth adapter (built-in or external dongle) for your laptop• Data plan from your mobile provider

(mouse click)InfraredAnother method of piggybacking uses Infrared. Infrared Data Association, or IrDA, refers to technologies involved in the transmission of data between electronic devices through infrared ports.

If two IrDA devices are connected through their infrared ports but only one has Internet access, the device without Internet access will be able to access the Internet through the other device. In this way, an Internet connection can be set up quickly for a computer through a cell phone with Internet access.

Although both of these methods are considered a networking standard, neither is ideal and aren’t really a replacement for Wi-Fi. The primary goal of both Bluetooth and Infrared is to link two devices directly (such as a laptop and printer), not to connect devices to the Internet.

Bluetooth connections are typically limited to about 30 feet and Infrared can be

document.doc Page 12 of 19

Page 13: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

even less, but are worth trying in an emergency!

Display TB5 L4 R1.ppt Slide 15

All communications between digital devices require that the devices agree on the format of the message being communicated.

A system of digital message formats and rules for exchanging those messages is called a ’protocol’.

Imagine the number of people communicating in the world, the different languages they use, the different devices they use, the different ways in which they transmit data and the different software they use. We would never be able to communicate worldwide if there were no ‘standards’ governing the way we communicate and the way our machines treat data. These standards are sets of rules.

(mouse click)These are the commonly used communication protocols:

• VoIP• POP• IMAP• SMTP• HTTP/S

Activity: class – vote

Note to teacher: ask the students to show their hands as to which terms have they heard of before. Record their responses on the next slide. (mouse click)

Display TB5 L4 R1.ppt Slide 16

Note to teacher: once you have recorded the students’ responses encourage them to explain each term. Depending on their responses, supplement students’ knowledge with the information below:

document.doc Page 13 of 19

Page 14: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

VoIPVoIP stands for Voice over Internet Protocol.Internet Protocol is the set of rules governing how packets are transmitted over a network or Internet. Remember a couple of things from the video we watched at the start of the lesson:

• Each machine has its own unique IP address to identify it(mouse click)

• When data (images, files, etc.) are sent over the Internet they are broken down into packets (mouse click)

• The Internet Protocol standardises the way machines over the Internet, or any IP network, forward or route their packets based on their IP addresses.

Along with addressing, routing is one of the main functions of the Internet protocol. Routing consists of forwarding IP packets from source to destination machines over a network, based on their IP addresses.VoIP transmits the sounds you make over the standard Internet infrastructure.It is also referred to as IP telephony or Internet telephony as it is another way of making phone calls, although now the ‘phone’ part is not always present anymore, as you can communicate without a telephone handset and just use your computer microphone and speakers. If your computer is connected to the Internet you can communicate using VoIP for free. This can also be possible with your mobile and home phones.VoIP has a lot of advantages over the traditional phone system. The main reason why people are turning to VoIP technology is that it is a cheaper way of making calls. Skype is the most popular service that allows users to make free calls.

document.doc Page 14 of 19

Page 15: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

POPPOP is short for Post Office Protocol.It is a protocol used to retrieve email from a mail server. Most email applications (sometimes called an email client) use the POP protocol, although more are using the newer IMAP – Internet Message Access Protocol.(mouse click) Remember Aunt Ruth receiving her email in the video we watched at the start of the lesson.

IMAPInternet message access is precisely what IMAP is for.When you retrieve your email messages from your Internet service provider's mail server in your email program, the server and your program (the client) have traditionally used POP to talk to each other.Providing a way to get email messages to your computer is what IMAP and POP share. While POP was designed to do merely that, IMAP does provide more useful functionality.In a typical POP session, you will download all new messages and delete them from the server immediately. This procedure works perfectly well as long as you access your email from only one computer and only one email program. As soon as you try to work on your email from more than one machine or device things get complicated.At the root of your problem lies POP's concept of offline email access. Email messages are delivered to the server. Your email program downloads them to your computer and deletes all messages from the server immediately. This means they are all local to your computer.While IMAP can be used for offline email access in much the same way as POP, it also provides online and disconnected mail processing. What does that mean? Basically, you operate on the mailbox that resides on the server as if it were local to your computer. Messages are not downloaded and deleted immediately, but reside on the server. There, they can be marked with several flags, for example ‘seen’, ‘deleted’, or other user-defined flags.POP and IMAP are used for retrieving and storing email so what about a protocol for sending your email? (mouse click)

document.doc Page 15 of 19

Page 16: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

SMTPSMTP stands for Simple Mail Transfer Protocol.SMTP provides a set of codes that simplify the communication of email messages between servers. It's a kind of shorthand that allows a server to break up different parts of a message into categories the other server can understand.

Any email message has a sender, a recipient (or sometimes multiple recipients), a message body, and usually a subject line. Once that message goes out on the Internet, everything is turned into strings of text. This text is separated by code words or numbers that identify the purpose of each section. SMTP provides those codes, and email server software is designed to understand what they mean.The other purpose of SMTP is to set up communication rules between servers. For example, servers have a way of identifying themselves and announcing what kind of communication they are trying to perform. There are also ways to handle errors, including common things like incorrect email addresses. In a typical SMTP transaction, a server will identify itself, and announce the kind of operation it is trying to perform. The other server will authorise the operation, and the message will be sent. If the recipient address is wrong, or if there is some other problem, the receiving server may reply with an error message of some kind.Most servers these days actually use a slightly updated version of the SMTP protocol called ESMTP (Extended Simple Mail Transfer Protocol). This was created to allow transmission of multimedia through email. When someone sends a picture or music file through their email program, ESMTP communication codes are used to identify the kind of data being transferred.

HTTP/SHTTP stands for ‘Hyper Text Transfer Protocol’.It is the primary technology protocol on the Web that allows linking and browsing.You will see this in the URL address of a website. The other acronym that you might have spotted in a URL is HTTPS.(mouse click)

This is stands Hyper Text Transfer Protocol’ with a ‘Secure’ layer. This protocol is primarily for safe Internet transactions.So when you navigate to a site such as Amazon or eBay and you go to pay for something, either through a secure shopping cart or an outside payment system

document.doc Page 16 of 19

Page 17: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

such as Paypal, you should see the address in your browser address bar change if the site you have arrived at is a https site, because the https in front of the URL indicates that you are now in a ‘secure session’.For added security, always log out of any secure session when you're done, and especially if you are on a computer used by other people.Display TB5 L4 R1.ppt Slide 17

So as you can see some protocols are there for added security for us, for example:

• when we want to buy something online

• to ensure our emails go to the right recipient.

(mouse click) Every computer connected to the Internet is assigned an Internet Protocol address, (IP address) which is more or less a unique identity of the computer or the computer network. This IP address is used as part of the security measures in some protocols.

This IP address can be used for security in another way too, to stop people getting into a network. (mouse click) This method is called IP filtering.

The IP address is a combination of numbers and the numbers are assigned in blocks of numbers per country. Currently there are approximately 2.8 billion IP addresses in use.

Through the IP address it is therefore possible to determine the country and other location data of visitors to a website or network. This information can be used to block or allow visitors based on the IP address.

document.doc Page 17 of 19

Page 18: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

(mouse click)IP filtering acts like a firewall to protect an internal network from intruders. IP filtering lets you control what IP traffic to allow into and out of your network. Basically, it protects a network by filtering packets according to rules that you define.

Plenary (5 min)

Display TB5 L4 R1.ppt Slide 18

Note to teacher: this slide is for you to collect the group’s thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken.

Today we have considered:

(mouse click)• what the Internet is• the communication networks that support ‘access anywhere’ to the Internet • various communication protocols• some additional security measures

Activity: class - who can remember what?

Note to teacher: encourage the students to give you a quick-fire answer to each of the bullet points above as a recap on the lesson.

Homework (30-60 min)

Display TB5 L4 R1.ppt Slide 19

document.doc Page 18 of 19

Page 19: Lesson Plan - ICT is Awesomeictisawesome.weebly.com/uploads/1/3/9/4/13947413/tb5…  · Web viewInternet message access is precisely what IMAP is for. When you retrieve your email

GCSE ICT – help with planning

Unit 1 Teaching Block 5 Lesson Plans

For your homework you need to answer the questions on the resource ‘Making the connection’ (TB5 L4 HW.doc). Use the notes you have made during this lesson on the resource ‘Take note!’ (TB5 L4 R2.doc) to help you. Answer the questions as fully as you can so that this will be a helpful resource to refer back to when you come to revise.

document.doc Page 19 of 19