290 likes | 378 Views
Developing School Intranets. Client Server networks. Technologies that make it possible HTML – Hypertext markup language Java - Java is a programming language expressly designed for use on the Internet TCP/IP – Transmission control protocol/internet protocol
E N D
Client Server networks • Technologies that make it possible • HTML – Hypertext markup language • Java - Java is a programming language expressly designed for use on the Internet • TCP/IP – Transmission control protocol/internet protocol • HTTP – Hypertext transmission protocol • FTP – File transfer protocol • SMTP – simple mail transfer protocol • How does it work ?
Page Requests • URL – Uniform resource locator • A request http://www.elwood.k12.nf.ca/ed3484/index.htm • The web server on port 80 accepts request • Web server software finds the file • Uses HTTP to send the computer back to the requesting computer
Browser Detail • Client browser breaks the URL into • The protocol - http • The server name - www.elwood.k12.nf.ca • The file name - \ed3484\index.htm • Browser to DNS • DNS – Domain Name Server • Changes server name to IP Address – 142.163.245.210 • Browser to Server • Connects to 142.163.245.210 • Sends request for \ed3484\index.htm
Server Detail • Server accepts request • Finds \ed3484\index.htm • Uses HTTP Protocol to send HTML text • Browser receives HTML text • Translates HTML text using HTML tags • Displays page in browser window
Domain Names • People have trouble remembering numbers • Domain names are easier and have 3 parts • http://www.internic.ca/
DNS – Domain Name Servers • Hold databases of Domain Names and IP addresses • Translates Domain Names to IP Addresses and vice-versa
IP Address • Each machine on the Internet is assigned a unique address called an IP address. • IP stands for Internet protocol, and normally expressed as four "octets" in a "dotted decimal number.” • Ex. 216.27.61.137
Protocols • is the pre-defined way that someone who wants to use a service talks with that service • FTP, File Transfer Protocol • Gopher, a hierarchical hyperlinkable protocol • HTTP, HyperText Transfer Protocol • IRC, Internet Relay Chat protocol • POP3 Post Office Protocol Version 3 • SMTP, Simple Mail Transfer Protocol • Telnet, a remote terminal access protocol
Introduction • What is an Intranet ? • Intranet/Internet what is the Difference? • What does an Intranet look Like ? • What is on the Intranet ?
Advantages • Access Speed • Security of sensitive data • Control and protection • Selective Content
Control and Protection 1 • Common Concerns • Limiting access to objectionable material • Amount of time required to find reliable info • Finding information at reading level • Ever present temptation to surf • Time on task
Control and Protection 2 • Intranet allows • Control of what users access • Selection of what is placed on intranet • A focus on resources to support curriculum objectives • Development of same skill set as Internet • Increased time on task
Disadvantages • More planning required • More lead time required • Learning a new skill set • Web searching/and Selective retrieving • Web page development • Graphics creation • Electronic collaboration
Security • Intranet security can be handled in many ways • No Connection to Internet • User Authentication • IP Address, machine specific security • 90.0.0.254, 90.0.0.1 • Network Card Physical Address • 00:15:F2:3A:BE:F2 • Firewalls • Software which blocks data on certain ports or routes requests from outside the network to other ports • Virus protection
Costs of an Intranet • Browsers (free) • Servers (probably already exists) • Training • Support • Development costs • Application software & licenses
Development Strategy • Install hardware and software • Choose browser • Decide who manages Intranet • Decide who will develop content • often Teachers • can be Students • Start small and grow
Getting started • Identify pilot projects • Examine the curriculum objectives • Pick an area where a small team or two can start • Identify the web master • Identify the content required • Gather information • Develop and publish pages
Intranet Tools • Web servers (Internet Information Server) • Web browsers • Web publisher • Documents • Graphics/Video • Conferencing software • Index server/search engine
Internet Information Server (IIS) • Bundled with Windows NT/2000/2003 server and Windows XP free upgrades • Integrates with NT Server • Security of userids and passwords • File level security • Uses current NT/2000/2003 server userlist
Intranet Content • School developed content • Collaborative content • Downloaded content • Grab-a-site • Other automated content grabbers • School calendar • School rules/handbook etc. • Student recognition
Downloaded Content • Teacher • Locates information on the net • Uses Grab-a-Site or Microsoft Front Page to download full sites of information • Organizes information • Network Admin • Sets up search engine on network • Students • Has students search Intranet
Advantages • Takes less time to develop a set of resources • Extremely fast to search • Restricted number of hits • Can be linked to Home Page • Students required to discriminate • Internet links can be included
Disadvantages • Information becoming obsolete • May not be tailored specifically to content • Takes up a lot of storage space on server • Legality of acquiring content • Some site give carte blanch permission to teachers/education • Can get permission for some • Others NO or Pay
Internet Acceptable Use Policy • An IAUP is a written agreement, between the student, the Parent and the school • intent is to identify permissible school uses of the Internet and prohibited school uses of the Internet. • it is a basic set of ground rules for your students use of the Internet.
Legal Implications • Schools, Districts • Make policy enforceable • Provide clear statements and consequences • Enforce the policy • Students & Parents(Guardians) • Make sure policy is read & understood • Make sure it is signed parent & Student
Components of Good Policy Sets out Consequences Escalation of breaches Escalation of consequences How will be administered Signatures Student Parent/Guardian Teacher as wittness • Title includes • School • Date of policy • Introduction • Value of Internet • Reason for policy • Rules outline • Appropriate use • Netiquete • Inappropriate use • Use of personal information
Assignment • Individually or in Groups of two • Review Elementary IAUP policies • Devise an acceptable use policy • Keep in mind the components of a good policy