Presentation is loading. Please wait.

Presentation is loading. Please wait.

Starter Note to teacher: throughout this lesson there are opportunities for some quick-fire discussions on various aspects of being connected to the Internet.

Similar presentations


Presentation on theme: "Starter Note to teacher: throughout this lesson there are opportunities for some quick-fire discussions on various aspects of being connected to the Internet."— Presentation transcript:

1 Starter Note to teacher: throughout this lesson there are opportunities for some quick-fire discussions on various aspects of being connected to the Internet to facilitate ‘any time, anywhere’ access. This will enable you to build upon the knowledge the students already have on this subject and complement where appropriate. It would be advisable to inform the students that it would be beneficial for them to take notes throughout the lesson on points that are new to them. They will require this information to complete the homework task and also for revision purposes. You could provide the students with the resource ‘Take note’ (TB5 L4 R2.doc) for this purpose. So far we have considered all sorts of digital devices that allow us to live ‘online’ any time, anywhere. This living ‘online’ is, in essence, being connected to the Internet. Now if I was to ask you what the Internet conjures up in your mind, would it be… (mouse click)

2 Vote Internet = Vote Internet = Note to teacher: ask the students to give a show of hands as to whether they think of the Internet as being more like a cloud or a wire. Record the vote against each representation straight into the slide whilst in presentation mode using a keyboard or Interactive White Board. Activity: class – vote A cloud or a wire? Let’s take a vote. All those who think of the Internet being like a cloud raise your hand. All those who think of the Internet being like a wire raise your hand.

3 Activity: class – watch video ‘How the Internet works’
Before we go any further it would be useful to establish/clarify what the Internet is. Activity: class – watch video ‘How the Internet works’ Note to teacher: click on the word ‘Internet’ to hyperlink to the video ‘ How the Internet Works’ (which can also be found at This short video explains very clearly what the Internet is. This will lay the foundation for this lesson on methods of connecting to the Internet and commonly used communication protocols. Image by: VEER/Corina Rosu

4 In this lesson we will learn about:
Lesson Objectives In this lesson we will learn about: the communication networks that support ‘access anywhere’ the protocols that support ‘access anywhere’ security measures to prevent access from certain locations Introduce the objective of this lesson and the outcomes to expect at the end Lesson Objective In this lesson students are learning about: the communication networks that support ‘access anywhere’ the protocols that support ‘access anywhere’ security measures to prevent access from certain locations Lesson Outcomes At the end of this lesson students will be able to: differentiate between methods of having ‘access anywhere’ recognise some of the commonly used communication protocols be aware of additional security measures when accessing online systems

5 Making that connection
From the video we have just watched we have identified that the Internet is in essence a ‘wire’. If we want to have connection to the ‘online’ world we have to connect to the Internet ‘wire’ in some way. All modern computers and laptops are capable of connecting to the Internet, as are many other devices, including mobiles, tablets, e-readers, televisions, video games consoles, etc. There are two ways of connecting to the Internet ‘wire’ at home. Can you tell me what they are? Note to teacher: allow time for student response. Depending on the responses, cover some or all of the information below: (mouse click) 1) The most popular way of connecting to the Internet in our homes is to have the telephone line, also known as the ‘landline’, converted to broadband so that it can carry normal phone calls and Internet data at the same time. 2) If you don’t have a landline or if you want to be able to use the Internet when you’re out and about, you might prefer mobile Internet from one of the mobile network providers. This can be used anywhere there’s a mobile signal but does tend to be slower and more expensive than broadband through a landline. Note to teacher: it is important at this point that the students realise that method one does not mean that they cannot be wireless within the home, but that the originating connection is being made from a land-based connection. Image by: VEER/Kirill Makarov Image by: VEER/Corina Rosu Image by: VEER/Andresr

6 What ‘bits’ do I need? Note to teacher: this slide is for you to collect the group’s thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken. Activity: class – discussion / knowledge base If we consider method one first, what are all the components or ‘bits’ that we will need to make the connection to the Internet ‘wire’? Note to teacher: allow time for student response. Depending on the responses, cover some or all of the information below: You will need: An internet service provider (ISP). This could be the company that provides the telephone line or it could be one of the many independent providers. The phone line converted to broadband A router microfilter (one for each active phone line in the house. This splits the signal in the telephone wire in two: voice and broadband.) Cables: a network cable to connect the router to your computer a power cable a cable that will go between your router and a microfilter    Image by: VEER/Kirill Makarov

7 Wi-Fi = any time, anywhere!
Not that long ago you would have always had to have a network cable running from your PC or laptop to make the connection to the Internet. But now most Internet providers supply wireless routers as standard, which means that can you have ‘Wi-Fi’ – a wireless broadband connection that allows you to connect to the Internet without using any cables. It’s particularly popular for use with laptops because they can then be used in any room of the house. (mouse click) Which can bring a whole new meaning to ‘any time, anywhere’! Image by: VEER/Corina Rosu Image by: VEER/Kirill Makarov Image by: VEER/Ilin Sergey

8 Which is better… wired or wireless?
There has been much debate on this matter, reliability and speed being the main concerns. What would you vote for? Note to teacher: move to the next slide to record the students’ votes. Image by: VEER/cherezoff Image by: VEER/Corina Rosu

9 Which is better… wired or wireless?
Vote Vote Activity: class – vote / discussion Note to teacher: ask the students to give a show of hands as to which they think is better. Record the votes straight into this slide whilst in presentation mode using a keyboard or Interactive White Board. To establish students’ knowledge on this subject, ask them to explain why they voted as they did. Through the discussion ensure you cover aspects such as: Wireless has improved significantly over the last few years with the introduction of Wireless Ethernet. The technology offers Ethernet speeds without the wires, with speeds similar to those of PCs hard wired to the network. The speed that is indicated is ‘theoretical’ and is the speed on your local network. Most high-speed Internet connections range from 1Mbps to 25 Mbps. Even on faster Internet connections you're only approaching half of the full throughput of your wireless system. For many the convenience of wireless by far outweighs any difference in transmission speed, but it can still be argued that wired will almost always be faster because you are hard wired and the connection is solid. For Internet browsing though, you will not be able to tell the difference for the most part as wireless connections will support most home Internet connections just fine. If you are doing lots of streaming and file transfers, you might want to consider wired connections. Further considerations are the area and where your wireless network is setup, and how many other wireless networks are in the area - latency and interference from other networks/devices. If you are gaming or using lots of streaming and need minimal latency, try to setup hard wired. If you are just surfing the web, 99% of the time you will not experience faster or slower Internet service between wired and wireless connections. Image by: VEER/cherezoff Image by: VEER/Corina Rosu

10 What ‘bits’ do I need to go wireless?
Note to teacher: this slide is for you to collect the group’s thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken. Activity: class – discussion / knowledge base So if you want to go wireless within your home what are all the components or ‘bits’ that we will need to make the connection to the Internet ‘wire’? Note to teacher: allow time for student response. Depending on the responses, cover some or all of the information below: You will need: Everything that you needed for the wired connection but the router will need to be a wireless router A computer with a built-in wireless adaptor or a separate adaptor    Image by: VEER/Kirill Makarov

11 Any time, anywhere Mobile Internet connection via dongle
As you will know Wi-Fi is also available in lots of public places such as cafés, hotels, trains and even some buses! (mouse click) So as long as your device is wireless-enabled you can connect to the Internet while out having a coffee. This method of connecting devices uses a wireless local area network or WLAN. Most digital devices that are currently available in shops come with a built-in Wi-Fi capability. The place where you can use Wi-Fi to connect to the Internet is usually referred to as a Wi-Fi hotspot. Every device, from laptop to smartphone, is going to have its own method of turning on the Wi-Fi and connecting to the Internet. For example on an Apple MacBook Pro, you simply click on a program and turn on Wi-Fi. Once the program is enabled, the computer’s software program begins searching for a Wi-Fi network to connect to. When you find an open network, you simple click on the name of the network and the computer automatically connects. Wi-Fi networks can be open or closed. If they are free and open, you can connect without any cost or obligation. Sometimes hotels, airports, public buildings such as libraries, many restaurants and other places provide free Wi-Fi. You can even put an app on your smartphone that will look for free Wi-Fi access and tell you when a free network connection is available. If there is not a free Wi-Fi connection, then there may be one for a fee or other charge. Some airports, for example, make money from selling Internet access to travellers and their connections cost a certain amount per hour or day. Other Wi-Fi networks may be closed or private. Some may be semi-private. For example, when you check into a hotel, the hotel may have free Wi-Fi but only give you a password if you are a registered guest. Wi-Fi is not much use if you are moving around a lot or in a vehicle or out in the country. Wi-Fi has a very limited range, hence the local area network designation. Most Wi-Fi connections outside your own private network are considerably slower than a direct high-speed Internet connection so if you have large files or programs to download, you may wish to wait until you have a direct Internet connection before starting the download. When you use Wi-Fi out and about, what you are really doing is connecting your device to the Internet through a wireless router located nearby (e.g. in a coffee shop, on a train, etc.) But what if you really want to have access ‘any time, anywhere’? Note to teacher: mouse click on the oval highlighting the dongle at the side of the laptop, and a text box will animate to display the text ‘Mobile Internet connection via a dongle’. You could discuss this method of connection further with the students. *Mouse click on the oval again to hide the text box before moving on. Mouse click to reveal an image of man using laptop on a park bench (which represents ‘any time anywhere’ access to the Internet). Note to teacher: move to the next slide to record the students’ responses. Image by: VEER/Corina Rosu Image by: VEER/bobboz + 3DMask

12 Any time, anywhere… how? Note to teacher: this slide is for you to collect the students’ thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken. Activity: class – discussion / knowledge base Note to teacher: encourage the students to provide various options for connecting to the Internet while on the move, not only with a laptop but through other devices too. Note, through the discussion ensure you cover aspects such as: The mainstay of mobile computing has been the portable computer or laptop. But now there are additional options in tablet computers, smartphones, and various Apple technologies too. Consider appropriateness of the device… you should also consider whether or not you will be entering data into the device. A laptop is a lot more convenient for entering data than a smartphone, but the laptop is also larger and much heavier. Tablet computers are becoming a compromise between smartphones and full-blown laptop computers, but you must still take into account the ease of entering data into the device. Since Wi-Fi is useful only at very short distances, if you want a more reliable and wide ranging connection, you will have to pay for a wireless Internet connection. Most mobile phone providers also sell devices that use the mobile phone system to connect to the Internet and create a hotspot for additional devices such as smartphones, tablets or laptops. Almost all smartphones come with a data plan from the service provider where you pay for a certain amount of Internet activity every month with surcharges for going over the limit. Those who own smartphones use Wi-Fi connections to avoid using up their allocation of paid access time. If you want to connect your laptop, smartphone or tablet directly to the Internet, you can do so with a wireless Internet device – this can be an external dongle or an internally installed wireless-enabled SIM card. This type of connection is called a mobile broadband Internet connection. These devices connect your device directly to the Internet. Some tablet computers and all smartphones come with this capability built in but in every case you have to pay for the connection on a daily, weekly or monthly basis. Image by: VEER/Corina Rosu

13 Wi-Fi Direct Considering Wi-Fi a little further and the fact that the world is falling out of love with cables, if you can use Wi-Fi to connect to the Internet can you use it to connect to other digital devices? For example, you might want to print from your laptop or smartphone to a wireless printer, or to share images with someone else in the same room, or to transmit video from your phone to your TV. None of these things requires an Internet connection, but they do need to connect to the printer, or to the other person's hardware, or to the TV. Has anybody heard of or used Wi-Fi Direct? (mouse click) Activity: class – watch short video Note to teacher: allow time for the students to respond, then watch the short animation. The image is hyperlinked to: After watching the video continue the discussion, ensuring you build on students’ existing knowledge, and covering the information below: Wi-Fi Direct is Wi-Fi without the Internet bit, taking simple tasks and providing simple connections. But Wi-Fi Direct can have the Internet bit too if you have a Wi-Fi router connected to the Internet. Wi-Fi Direct doesn't need a wireless access point as Wi-Fi Direct devices can connect to each other without having to go through an access point: they can establish ad-hoc networks as and when required, letting you see which devices are available and choose which one you want to connect to. If that sounds very like Bluetooth, that's because it is. Wi-Fi Direct uses Wi-Fi Protected Setup to prevent unauthorised connections and keep your communications private. There are two ways to establish a connection: with physical buttons – ‘press the button on gadget X and then the same one on gadget Y’, or with PIN codes.

14 Piggyback connection! Bluetooth Infrared
So if you can utilise a connection method first intended for connecting a device to the Internet to then connect other digital devices to each other could this be done vice versa? Digital devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams. In essence many of our digital devices talk to each other, so could we also use one of these methods to connect/talk to the Internet? (mouse click) There are ways of doing this, and this is known as ‘piggybacking’. Activity: class – discussion / knowledge base Note to teacher: ask the students if they have heard of this or have and any experience of this method of connecting to the Internet. Bluetooth Note to teacher: after the initial student responses continue the discussion, ensuring you build on students’ existing knowledge, and covering the information below: Using a Bluetooth-enabled mobile phone as a modem for Internet access on a laptop is a good alternative when there's no Wi-Fi service available or your regular Internet service goes down. The main benefit of using Bluetooth instead of a USB cable for tethering or ‘piggybacking’ is that you can keep your mobile phone in your bag or pocket and still make the connection. In essence you can use a 3G phone as a Bluetooth modem, based on basic Bluetooth paring. All you need is: Bluetooth-enabled mobile phone Bluetooth adapter (built-in or external dongle) for your laptop Data plan from your mobile provider Infrared Another method of piggybacking uses Infrared. Infrared Data Association, or IrDA, refers to technologies involved in the transmission of data between electronic devices through infrared ports. If two IrDA devices are connected through their infrared ports but only one has Internet access, the device without Internet access will be able to access the Internet through the other device. In this way, an Internet connection can be set up quickly for a computer through a cell phone with Internet access. Although both of these methods are considered a networking standard, neither is ideal and aren’t really a replacement for Wi-Fi. The primary goal of both Bluetooth and Infrared is to link two devices directly (such as a laptop and printer), not to connect devices to the Internet. Bluetooth connections are typically limited to about 30 feet and Infrared can be even less, but are worth trying in an emergency! Image by: VEER/Corina Rosu

15 Communication protocols:
VoIP POP IMAP SMTP HTTP/S All communications between digital devices require that the devices agree on the format of the message being communicated. A system of digital message formats and rules for exchanging those messages is called a ’protocol’. Imagine the number of people communicating in the world, the different languages they use, the different devices they use, the different ways in which they transmit data and the different software they use. We would never be able to communicate worldwide if there were no ‘standards’ governing the way we communicate and the way our machines treat data. These standards are sets of rules. (mouse click) These are the commonly used communication protocols: VoIP POP IMAP SMTP HTTP/S Activity: class – vote Note to teacher: ask the students to show their hands as to which terms have they heard of before. Record their responses on the next slide. (mouse click)

16 Communication protocols:
VoIP POP IMAP SMTP HTTP/S HTTPS SMTP POP / IMAP Data packets IP Addresses Note to teacher: once you have recorded the students’ responses encourage them to explain each term. Depending on their responses, supplement students’ knowledge with the information below: VoIP VoIP stands for Voice over Internet Protocol. Internet Protocol is the set of rules governing how packets are transmitted over a network or Internet. Remember a couple of things from the video we watched at the start of the lesson: Each machine has its own unique IP address to identify it (mouse click) When data (images, files, etc.) are sent over the Internet they are broken down into packets (mouse click) The Internet Protocol standardises the way machines over the Internet, or any IP network, forward or route their packets based on their IP addresses. Along with addressing, routing is one of the main functions of the Internet protocol. Routing consists of forwarding IP packets from source to destination machines over a network, based on their IP addresses. VoIP transmits the sounds you make over the standard Internet infrastructure. It is also referred to as IP telephony or Internet telephony as it is another way of making phone calls, although now the ‘phone’ part is not always present anymore, as you can communicate without a telephone handset and just use your computer microphone and speakers. If your computer is connected to the Internet you can communicate using VoIP for free. This can also be possible with your mobile and home phones. VoIP has a lot of advantages over the traditional phone system. The main reason why people are turning to VoIP technology is that it is a cheaper way of making calls. Skype is the most popular service that allows users to make free calls. POP POP is short for Post Office Protocol. It is a protocol used to retrieve from a mail server. Most applications (sometimes called an client) use the POP protocol, although more are using the newer IMAP – Internet Message Access Protocol. (mouse click) Remember Aunt Ruth receiving her in the video we watched at the start of the lesson. IMAP Internet message access is precisely what IMAP is for. When you retrieve your messages from your Internet service provider's mail server in your program, the server and your program (the client) have traditionally used POP to talk to each other. Providing a way to get messages to your computer is what IMAP and POP share. While POP was designed to do merely that, IMAP does provide more useful functionality. In a typical POP session, you will download all new messages and delete them from the server immediately. This procedure works perfectly well as long as you access your from only one computer and only one program. As soon as you try to work on your from more than one machine or device things get complicated. At the root of your problem lies POP's concept of offline access. messages are delivered to the server. Your program downloads them to your computer and deletes all messages from the server immediately. This means they are all local to your computer. While IMAP can be used for offline access in much the same way as POP, it also provides online and disconnected mail processing. What does that mean? Basically, you operate on the mailbox that resides on the server as if it were local to your computer. Messages are not downloaded and deleted immediately, but reside on the server. There, they can be marked with several flags, for example ‘seen’, ‘deleted’, or other user-defined flags. POP and IMAP are used for retrieving and storing so what about a protocol for sending your ? (mouse click) SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP provides a set of codes that simplify the communication of messages between servers. It's a kind of shorthand that allows a server to break up different parts of a message into categories the other server can understand. Any message has a sender, a recipient (or sometimes multiple recipients), a message body, and usually a subject line. Once that message goes out on the Internet, everything is turned into strings of text. This text is separated by code words or numbers that identify the purpose of each section. SMTP provides those codes, and server software is designed to understand what they mean. The other purpose of SMTP is to set up communication rules between servers. For example, servers have a way of identifying themselves and announcing what kind of communication they are trying to perform. There are also ways to handle errors, including common things like incorrect addresses. In a typical SMTP transaction, a server will identify itself, and announce the kind of operation it is trying to perform. The other server will authorise the operation, and the message will be sent. If the recipient address is wrong, or if there is some other problem, the receiving server may reply with an error message of some kind. Most servers these days actually use a slightly updated version of the SMTP protocol called ESMTP (Extended Simple Mail Transfer Protocol). This was created to allow transmission of multimedia through . When someone sends a picture or music file through their program, ESMTP communication codes are used to identify the kind of data being transferred. HTTP/S HTTP stands for ‘Hyper Text Transfer Protocol’. It is the primary technology protocol on the Web that allows linking and browsing. You will see this in the URL address of a website. The other acronym that you might have spotted in a URL is HTTPS. This is stands Hyper Text Transfer Protocol’ with a ‘Secure’ layer. This protocol is primarily for safe Internet transactions. So when you navigate to a site such as Amazon or eBay and you go to pay for something, either through a secure shopping cart or an outside payment system such as Paypal, you should see the address in your browser address bar change if the site you have arrived at is a https site, because the https in front of the URL indicates that you are now in a ‘secure session’. For added security, always log out of any secure session when you're done, and especially if you are on a computer used by other people. Image by: VEER/Alexandr Mitiuc, bobboz, Alexander Yurkinskiy, Snowdon Image by: VEER/Alexandr Mitiuc, bobboz, Alexander Yurkinskiy, Snowdon Image by: VEER/chrisgorgio Image by: VEER/Alexandr Mitiuc Image by: VEER/Veronika Vasilyuk

17 IP filtering Security from within
So as you can see some protocols are there for added security for us, for example: when we want to buy something online to ensure our s go to the right recipient. (mouse click) Every computer connected to the Internet is assigned an Internet Protocol address, (IP address) which is more or less a unique identity of the computer or the computer network. This IP address is used as part of the security measures in some protocols. This IP address can be used for security in another way too, to stop people getting into a network. This method is called IP filtering. The IP address is a combination of numbers and the numbers are assigned in blocks of numbers per country. Currently there are approximately 2.8 billion IP addresses in use. Through the IP address it is therefore possible to determine the country and other location data of visitors to a website or network. This information can be used to block or allow visitors based on the IP address. IP filtering acts like a firewall to protect an internal network from intruders. IP filtering lets you control what IP traffic to allow into and out of your network. Basically, it protects a network by filtering packets according to rules that you define. Image by: VEER/Corina Rosu Image by: VEER/XtravaganT Image by: VEER/Kirill Makarov

18 Communication protocols Some additional security measures
Plenary What the Internet is The communication networks that support ‘access anywhere’ to the Internet Communication protocols Some additional security measures Note to teacher: this slide is for you to collect the group’s thoughts. You can type / write straight into this whilst in presentation mode through a keyboard or Interactive White Board. Saving the PowerPoint will save the notes taken. Today we have considered: (mouse click) what the Internet is the communication networks that support ‘access anywhere’ to the Internet various communication protocols some additional security measures Activity: class - who can remember what? Note to teacher: encourage the students to give you a quick-fire answer to each of the bullet points above as a recap on the lesson.

19 Homework Homework: For your homework you need to answer the questions on the resource ‘Making the connection’ (TB5 L4 HW.doc). Use the notes you have made during this lesson on the resource ‘Take note!’ (TB5 L4 R2.doc) to help you. Answer the questions as fully as you can so that this will be a helpful resource to refer back to when you come to revise.


Download ppt "Starter Note to teacher: throughout this lesson there are opportunities for some quick-fire discussions on various aspects of being connected to the Internet."

Similar presentations


Ads by Google