1 / 29

Developing School Intranets

Developing School Intranets. Client Server networks. Technologies that make it possible HTML – Hypertext markup language Java - Java is a programming language expressly designed for use on the Internet TCP/IP – Transmission control protocol/internet protocol

falala
Download Presentation

Developing School Intranets

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Developing School Intranets

  2. Client Server networks • Technologies that make it possible • HTML – Hypertext markup language • Java - Java is a programming language expressly designed for use on the Internet • TCP/IP – Transmission control protocol/internet protocol • HTTP – Hypertext transmission protocol • FTP – File transfer protocol • SMTP – simple mail transfer protocol • How does it work ?

  3. How the Internet Works

  4. Page Requests • URL – Uniform resource locator • A request http://www.elwood.k12.nf.ca/ed3484/index.htm • The web server on port 80 accepts request • Web server software finds the file • Uses HTTP to send the computer back to the requesting computer

  5. Browser Detail • Client browser breaks the URL into • The protocol - http • The server name - www.elwood.k12.nf.ca • The file name - \ed3484\index.htm • Browser to DNS • DNS – Domain Name Server • Changes server name to IP Address – 142.163.245.210 • Browser to Server • Connects to 142.163.245.210 • Sends request for \ed3484\index.htm

  6. Server Detail • Server accepts request • Finds \ed3484\index.htm • Uses HTTP Protocol to send HTML text • Browser receives HTML text • Translates HTML text using HTML tags • Displays page in browser window

  7. Domain Names • People have trouble remembering numbers • Domain names are easier and have 3 parts • http://www.internic.ca/

  8. DNS – Domain Name Servers • Hold databases of Domain Names and IP addresses • Translates Domain Names to IP Addresses and vice-versa

  9. IP Address • Each machine on the Internet is assigned a unique address called an IP address. • IP stands for Internet protocol, and normally expressed as four "octets" in a "dotted decimal number.” • Ex. 216.27.61.137

  10. Protocols • is the pre-defined way that someone who wants to use a service talks with that service • FTP, File Transfer Protocol • Gopher, a hierarchical hyperlinkable protocol • HTTP, HyperText Transfer Protocol • IRC, Internet Relay Chat protocol • POP3 Post Office Protocol Version 3 • SMTP, Simple Mail Transfer Protocol • Telnet, a remote terminal access protocol

  11. Introduction • What is an Intranet ? • Intranet/Internet what is the Difference? • What does an Intranet look Like ? • What is on the Intranet ?

  12. Advantages • Access Speed • Security of sensitive data • Control and protection • Selective Content

  13. Control and Protection 1 • Common Concerns • Limiting access to objectionable material • Amount of time required to find reliable info • Finding information at reading level • Ever present temptation to surf • Time on task

  14. Control and Protection 2 • Intranet allows • Control of what users access • Selection of what is placed on intranet • A focus on resources to support curriculum objectives • Development of same skill set as Internet • Increased time on task

  15. Disadvantages • More planning required • More lead time required • Learning a new skill set • Web searching/and Selective retrieving • Web page development • Graphics creation • Electronic collaboration

  16. Security • Intranet security can be handled in many ways • No Connection to Internet • User Authentication • IP Address, machine specific security • 90.0.0.254, 90.0.0.1 • Network Card Physical Address • 00:15:F2:3A:BE:F2 • Firewalls • Software which blocks data on certain ports or routes requests from outside the network to other ports • Virus protection

  17. Costs of an Intranet • Browsers (free) • Servers (probably already exists) • Training • Support • Development costs • Application software & licenses

  18. Development Strategy • Install hardware and software • Choose browser • Decide who manages Intranet • Decide who will develop content • often Teachers • can be Students • Start small and grow

  19. Getting started • Identify pilot projects • Examine the curriculum objectives • Pick an area where a small team or two can start • Identify the web master • Identify the content required • Gather information • Develop and publish pages

  20. Intranet Tools • Web servers (Internet Information Server) • Web browsers • Web publisher • Documents • Graphics/Video • Conferencing software • Index server/search engine

  21. Internet Information Server (IIS) • Bundled with Windows NT/2000/2003 server and Windows XP free upgrades • Integrates with NT Server • Security of userids and passwords • File level security • Uses current NT/2000/2003 server userlist

  22. Intranet Content • School developed content • Collaborative content • Downloaded content • Grab-a-site • Other automated content grabbers • School calendar • School rules/handbook etc. • Student recognition

  23. Downloaded Content • Teacher • Locates information on the net • Uses Grab-a-Site or Microsoft Front Page to download full sites of information • Organizes information • Network Admin • Sets up search engine on network • Students • Has students search Intranet

  24. Advantages • Takes less time to develop a set of resources • Extremely fast to search • Restricted number of hits • Can be linked to Home Page • Students required to discriminate • Internet links can be included

  25. Disadvantages • Information becoming obsolete • May not be tailored specifically to content • Takes up a lot of storage space on server • Legality of acquiring content • Some site give carte blanch permission to teachers/education • Can get permission for some • Others NO or Pay

  26. Internet Acceptable Use Policy • An IAUP is a written agreement, between the student, the Parent and the school • intent is to identify permissible school uses of the Internet and prohibited school uses of the Internet. • it is a basic set of ground rules for your students use of the Internet.

  27. Legal Implications • Schools, Districts • Make policy enforceable • Provide clear statements and consequences • Enforce the policy • Students & Parents(Guardians) • Make sure policy is read & understood • Make sure it is signed parent & Student

  28. Components of Good Policy Sets out Consequences Escalation of breaches Escalation of consequences How will be administered Signatures Student Parent/Guardian Teacher as wittness • Title includes • School • Date of policy • Introduction • Value of Internet • Reason for policy • Rules outline • Appropriate use • Netiquete • Inappropriate use • Use of personal information

  29. Assignment • Individually or in Groups of two • Review Elementary IAUP policies • Devise an acceptable use policy • Keep in mind the components of a good policy

More Related