Module 4: Networking, Communication, Web 2.0

advertisement
Computer Lab Manager Training Course
Zambia Pacific Trust
Module 4: Networking, Communication, Web 2.0
Summary
This module covers both the technical skill of maintaining and troubleshooting a computer network,
and the “soft” skills related to using this network for effective communication and knowledge building.
The online instruction in this course provides an introduction to networking topics as well as skill
building in using email and various web 2.0 (social networking, collaborative writing, etc.) utilities. The
workshop includes practice with network maintenance and troubleshooting, basic server computer use
and practical experience with how web 2.0 can be beneficial to various computer projects.
1
Module 4: Networking, Communication, Web 2.0
Resource Book
Author: Heidi Neff, Consultant to Zambia Pacific Trust, heidihneff@gmail.com
First Edition – May 2010
More information about Heidi Neff and Zambia Pacific Trust is found at the end of this module.
Acknowledgements
The Computer Lab Manager Training Course resource books were made possible due to the efforts and
encouragement provided by a variety of people around the world. Special thanks are due to two
pioneering organizations working on computers in education in Zambia who provided advice and
materials: Computers for Zambian Schools and Crescent Future Kids. Three international
development aid organizations: Camara, VVOB and IICD, also deserve special recognition for their
contributions to this document and the efforts they are making to use ICT as a tool for development
and education in Zambia and elsewhere. Many individuals also contributed their time, expertise and
advice to the crafting of this module. Key among them are Bornwell Mwewa, David Dionys and
Collardo Mweemba. In addition, none of Zambia Pacific Trust’s work toward improving computer
education at schools in Lusaka, Zambia would have been possible without the support, advice and
equipment provided by Seattle Academy in Seattle, Washington, USA.
Licensing
This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 United
States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-ncsa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco,
California, 94105, USA.
Zambia Pacific Trust welcomes and encourages organizations to use any of the modules of the
Computer Lab Manager Training Course in a manner they deem appropriate, excluding making a profit
from the sale or distribution of the material. Organizations are welcome to use portions of these
modules in other documents, but they should attribute the material that is used to Zambia Pacific
Trust. Zambia Pacific Trust also appreciates knowing who is benefiting from this material, and requests
that individuals and organizations please email Bornwell Mwewa (bornwellmwewa@gmail.com), Heidi
Neff (heidi.h.neff@gmail.com) and Zambia Pacific Trust (info@zptrust.org) and describe how the
material is being used.
2
Module 4 Table of Contents
1. Introduction
1.1. Introduction to the Computer Lab Manager Training Course
1.2. Introduction to Module 4
2. Basic Computer Networking Knowledge
2.1. Introduction and Definitions
2.2. Network Types and Designs
2.3. Types of Internet Connections
2.4. Networking Equipment
2.5. Assignments/Activities
3. Networking Skill
3.1. Setting Up and Managing a Simple LAN and Internet Connection
3.2. Managing Computers Using a Server
3.3. Troubleshooting Network Failures
3.4. Shared Printers
3.5. Maintaining Internet Security
3.6. Assignments/Activities
4. Using The Internet
4.1. Using Email
4.2. Effective Email Communication
4.3. Web 2.0: Part I – Web 2.0 for Communication
4.4. Web 2.0: Part II – Web 2.0 for Collaborating, Organizing and Teaching
4.5. Building a Simple Web Page
4.6. Assignments/Activities
5. Overall Assignments/Activities
6. List of Internet Resources
7. Bibliography
Module 4 Text
1. Introduction
1.1. Introduction to the Computer Lab Manager Training Course
The Computer Lab Manager Training Course was developed by Zambia Pacific Trust in
collaboration with a variety of organizations working on IT related development projects in
Zambia. While these projects are in several different sectors (health, education, agriculture and
community), all of the organizations recognized the need to increase the number of people
who have training in computers past the standard level of a computer user. A particular need
that was identified was for individuals who could maintain dynamic and well functioning
computer labs and other centers for IT use within a particular project. Therefore, a multi3
faceted training course was developed to meet these needs including both the “hard skills” of
computer maintenance, repair, and networking and the “soft skills” of management,
leadership, communication and instruction. Readers may find more emphasis shown on
educational projects, since that is the area of Zambia Pacific Trust’s experience. However, most
topics discussed apply equally well in the other sectors where IT is used.
The resource books for these modules are designed to be used as a part of an
instructor-led four module course, with each course including both a distance (online)
instruction component and a one week face-to-face workshop. This resource book is written to
accompany the fourth of the four modules listed below.
Module 1: Computer Maintenance, Troubleshooting and Repair
Module 2: Management and Leadership
Module 3: Instruction, Facilitating IT Use and IT in Education
Module 4: Networking, Communication and Web 2.0
The target audience for this training course is adult learners who already have
intermediate computer user skills and significant experience using computers. Ideally,
participants are already employed as computer lab managers, computer project coordinators or
Internet café managers. While the course is tailored to those working in educational or
community organizations, the course is still valuable for those working in a similar capacity in
the private sector.
These learning materials are also valuable for people who are not involved in a formal
course, but instead are studying independently to become computer lab managers or improve
their skills as computer lab managers. Learners who are using these materials for self study are
encouraged to make the training as hands-on as possible, performing as many of the
assignments and activities as they can practically achieve.
In addition all learners, whether using these materials for self-study or as a part of a
formal course, would benefit from continuing to develop their own skills in three important
areas that are not included in this course: Touch Typing, English Reading and Writing, and
Computer User Skills. Suggested resources for self study in these areas are presented in section
1.3 of the Module 1 resource book.
1.2. Introduction to Module 4
The word “network” has a variety of meanings that apply to people working on
computer projects. As a noun, the word refers to a variety of netlike connections, including
those that would connect a group of computers to themselves or to the Internet to share
information. The noun also refers to a group of a group of collected people who can share
information of be of assistance to each other. The verb network can refer to making the
connections described above, between people or between computers. A computer lab
manager needs to understand, create and maintain networks of both the human and
computer varieties.
4
The goals of this module include not only helping lab managers understand the basics of
computer networking, but also how they can best put these networks to use to help people
share information. Therefore the module also includes important topics in email and other
forms of communication over the Internet. The module also includes information on Web 2.0,
the term used to describe the web applications that facilitate networking, information sharing
and collaboration. Participants in this course will be encouraged to practice with these
technologies and apply them to their own computer projects.
Table of Contents
2. Basic Computer Networking Knowledge
2.1. Introduction and Definitions
In general, these training modules have focused more on learning practical skills rather
than learning the theory behind any of the skills discussed. This trend will continue in this
module. However, some background understanding of the terminology used when working
with networks will help computer lab managers to move forward through this module
smoothly. Therefore some of this basic information is covered through the definitions and
abbreviations that are explained below.






Computer Network. A computer network is a group of computers connected for the
purpose of communication or sharing information, software or hardware. They can be
connected through a variety of means including both wired and wireless.
The Internet. This is the largest computer network in the world! It is a constantly
growing connection of computers and networks around the world, and is used to
communicate and share information in many ways, some of which will be discussed
later in this module.
ISP (Internet Service Provider). This is the organization or company that connects an
individual computer or a computer network to the Internet, therefore allowing for
communication and collaboration with millions of other computers and their users.
Download/Upload. These terms are used to describe the process of an individual
computer receiving (downloading) information from a network or the Internet or
sending (uploading) information to a network or the Internet. For example, a user
might download a file they received attached to an email message or upload a picture to
share on a website.
Bandwidth. Bandwidth is the rate at which information that can be transmitted over an
Internet connection at any one time. Bandwidth is affected by the type of Internet
connection (described in section 2.3) and the limitations of the ISP. The greater the
bandwidth, the faster an Internet user is able to access information from the Internet.
Firewall. A firewall is a tool that is designed to protect a computer or a network from
security threats (such as malware or unauthorized access) from the Internet. A firewall
5




can be a piece of software found on an individual computer, or a hardware device
incorporated into a computer network.
IP Address. An Internet protocol (IP) address is a four part number, written with
decimal points (full stops) separating each part. An example IP address is
192.168.0.200. An IP address is rather like a “phone number” for a computer or
networking equipment. Computers on the Internet that know each other’s IP addresses
can communicate with each other. Networking equipment (such as routers and server
computers) keeps track of these IP addresses as they facilitate connections between
computers. Every computer on the Internet or on a network using TCP/IP (described
below) must have its own IP address. Due to the ever expanding numbers of computers
connected to the Internet, a new system with six part IP addresses (called IPv6) has
been developed and will eventually become the standard on the Internet.
TCP/IP. TCP/IP is short for Transmission Control Protocol/Internet Protocol. These
protocols (or rules) define how devices (such as computers and routers) communicate
with each other. TCP/IP determines the best path for information (data) to travel from
one device to another. TCP/IP will break up data into small packets that are sent
separately and then reassembled upon arrival.
DHCP. The Dynamic Host Configuration Protocol (DHCP) is a set of rules used by a DHCP
server (a server computer, a firewall, a modem or a router) to allocate IP addresses to
computers on a local network or the Internet. Using DHCP is typically easier than having
a lab manager or computer users assign and keep track of IP addresses. In most small
networks the router acts as the DHCP server.
MAC Address. The Media Access Control (MAC) address is also known as the physical
address for any device (such as a network interface card or a wireless network adapter)
that connects a computer to a network. Every network device has its own unique MAC
address that (like a serial number) cannot be changed and is useful for identifying that
device when it is a part of a network.
2.2. Network Types and Designs
Computer networks come in a variety of types and designs, depending on the size and
needs of an organization. Lab managers who are interested in understanding all of the options
in detail are encouraged to take a full course on computer networking. For the purposes of
this module, however, only the types and designs of networks that a lab manager is most likely
to encounter or use will be discussed. When networking the computers in a single room or
building (or perhaps a group of closely associated buildings), the network is called a local area
network or LAN. Setting up a LAN allows the computers in the network to communicate
between each other internally (called an intranet). This can be very useful for sharing
information and resources (such as printers), even if the network is not connected to the
Internet. If a LAN is comprised entirely of computers communicating wirelessly, it is referred
to as a wireless local area network or WLAN. There are several names used to describe
networks that are geographically larger than a LAN or WLAN. For example, a campus area
network (CAN) describes a network that encompasses several nearby buildings. The term
metropolitan area network (MAN) is used to describe a network that connects two or more
LANs in the same city. A wide area network (WAN) describes a connection between two or
6
more distant LANS, such as two locations of the same company in different cities. The largest
network of all is the Internet. The Internet is the result of connections between computers
and networks all over the world.
When
connecting
computers with
wires to form a LAN,
the pattern (called a
network topology) is
important to
consider. In the
diagrams shown
here (Figure 1) the
dots represent
computers or other
Figure 1 - Network Topology from www.wikipedia.org (see bibliography)
devices connected
to a network. The lines represent cables connecting the devices. When choosing a topology, it
is important to consider what will happen if one of the cables fails. In ring, line and bus
topologies, a failure in a cable can cause many dependent computers to lose a connection.
Therefore, star topology is much more common and reliable in computer labs, even though it
requires more cable. The dot in the middle of the star is either a server or a router (both terms
are explained in section 2.4), sharing information between the other computers shown. Tree
and mesh topology are options to consider as well. These topologies can still have multiple
computers dependent on the same cable, but in some situations they are much easier to set
up than a star topology. The fully connected (or full mesh) topology uses many cables in order
to avoid dependency on a single computer or cable, but requires the most cable and is the
most complex to install.
Many networks are not as simple as those shown in figure 1. A combination of two or
more topologies can end up being the most suitable for a project. For example, a bus or tree
topology might be used to connect two different work areas or rooms that each contains
several computers. Then within each room there could be a group of computers connected
with a star topology with a switch (described in section 2.4) at the center. These more
complex networks might be called “expanded star” or “expanded tree” networks.
2.3. Types of Internet Connections
Connecting a computer or a network to the Internet greatly increases the usefulness of
those computers for information and communication. This usefulness will be discussed in
detail later in this module. Computer lab managers in developing countries, however, will
have to make tough decisions about whether or not to connect to the Internet and what type
of connection to obtain. The equipment involved and the ISP subscription fees can be quite
costly. In developing countries it is also possible that some of the types of Internet
connections described below will not be available, particularly in rural areas.
7
2.3.1. Dial-up
Originally, all computers connected to the Internet using dial-up. This is a connection to
the Internet that uses standard phone lines and requires a computer to have a device called a
modem installed that “translates” the information coming in over the phone line for the
computer to use. Dial-up connections are available in many communities with telephone landlines, and are the least expensive method of connecting to the Internet. However, dial-up
connections also have the least bandwidth of any of the Internet connection methods
described here. A dial-up connection will be sufficient for a single computer user to check email
or view websites with few graphics. The user will find that many websites will load very slowly,
and downloading files will also be a slow process. A dial-up connection is also not suitable for a
network that will have more than one user accessing the Internet at the same time.
2.3.2. Broadband
The term broadband is usually used to describe the range of Internet connection
technologies that all result in faster (more bandwidth) connections than dial-up. There are
many different types of broadband connections. The most common connections for computer
projects in developing countries are described below, from the least expensive (in terms of
both connection equipment and monthly access fees) to the most expensive.
 GPRS. General packet radio service (GPRS) is the technology used to transfer
information over cell phone networks. People with cell phones that connect to the
Internet are using GPRS technology. The abbreviations 2G (second generation) and 3G
(third generation) are used to describe the different systems in use. 3G allows for
greater bandwidth, but is not available in all countries. Users may also hear about EDGE
networks, which use an improved version of the 2G system and HSDPA, which is an
enhancement to 3G networking. Computers can be connected to the Internet via GPRS
if they are equipped with GPRS modems, which are available from cell phone network
companies in many countries. The user puts a pre-paid SIM card in the GPRS modem to
obtain Internet access. Like a dial-up modem, however, a GPRS modem is usually only
used with a single computer. This is a good option when there are not funds available
for the installation of a computer network and the computer lab manager needs only
occasional Internet access.
 DSL/Cable. This category includes any broadband Internet service that is available
through a cable line that connects to a computer lab. These lines may be phone lines or
dedicated cables for Internet service from an ISP. The cables can be wire or optic fiber.
Typically these services result in good bandwidth, but they are not available in many
places in developing countries.
 Radio Signal/WiMax. In many cities, ISPs have set up radio transmitters for wireless
Internet access. These transmitters typically use WiMax technology, capable of
transmitting radio signals over many kilometers. To obtain broadband Internet through
these transmitters, the computer project will need a moderately priced radio receiver.
In some cases the receiver will need to be mounted on a mast for better reception. The
ISP will charge various monthly access fees for Internet service. Typically, the greater
the bandwidth or the higher the download limit, the greater the price.
8

VSAT. Very Small Aperture Terminal (VSAT) connections are typically the only
broadband option available for Internet connections in rural locations in developing
countries. These connections use a satellite dish and related equipment in order to
receive Internet bandwidth from an orbiting satellite. Unfortunately, VSAT equipment is
quite expensive. There are also monthly access fees for the Internet service, which vary
as described above.
2.4. Networking Equipment
The equipment required to set up a computer network varies depending on the type,
size and purpose of a network. If a network’s main purpose, for example, is to connect a group
of computers to the Internet, then equipment will be needed to receive the Internet signal
from the ISP. This equipment varies widely and was described briefly in the previous section.
Other common equipment is described here.
 Router. A router is a device used to connect two different networks. In most cases the
two networks it connects are a LAN and the Internet (via a modem or other device that
receives an Internet signal). Routers can also direct Internet traffic to various
computers on the LAN. This allows many small networks to operate without a server
(described below). Routers have varying numbers of ports that allow for connections to
computers or switches. Wireless Routers are routers that also act as wireless access
points (described below).
 Cable. Unless a network is entirely wireless, CAT-5 (category 5) cable (also known as
Ethernet cable) is required to connect all devices on the network. CAT-5e (category 5
enhanced) and CAT-6 are recent improvements on CAT-5.
 Switch. A switch is a device used to connect several computers at one point. This is
useful for star, tree and mesh network topologies, and when the router on a network
does not contain enough ports to connect all of the computers or other devices on the
LAN. Switches also control network traffic by directing specific data only to the
computer that requested it. Before switches were developed networks used hubs to
connect computers, but these did not control network traffic.
 Wireless Access Points. Many computers contain wireless adapters that allow for
connections using radio signals instead of cables. In order to transmit and receive these
radio signals, a network needs either a wireless router or a wireless access point. A
wireless access point performs the same role on a wireless LAN (WLAN) as a switch does
on a LAN. A WLAN that covers a wide area may need multiple wireless access points in
order to have all computers in signal range. All wireless computer devices use the
WLAN standard (called 802.11) for transmitting and receiving. However, this standard
has been refined and improved over the years from 802.11b to 802.11a to 802.11 g.
The newest standard (still in development in 2009) is 802.11n. New wireless equipment
should be compatible with the b, g and n standards.
 Cards and Adapters. Each computer that participates in a LAN needs to have hardware
that allows it to connect to the network. Most computers have a built in network
interface card (NIC, also called an Ethernet card) that allows it to connect to CAT-5
cables via the Ethernet port. For wireless connections, a wireless adapter is needed.
9


Most laptop computers have internal wireless adapters, but some older laptop
computers and many desk top computers do not. For these situations, the easiest
solution is to buy an external wireless adapter that plugs into the computer’s USB port.
Server. A server computer is used on a network to share information and direct traffic
to other (client) computers. Many small networks do not need servers. Server
computers will be discussed further in section 3.2.
Shared Hardware. One possible use of a LAN is to network peripheral hardware so that
it can be shared amongst all of the computers on the network. Printers are commonly
networked and will be discussed further in section 3.4. Other hardware that can be
networked includes scanners, webcams and hard drives (for backing up data).
It is worth noting that all networking equipment has its own operating speed, which
controls the maximum speed of communication within a LAN. Replacing older and slower
equipment can improve network speed.
2.5. Assignments/Activities
2.5.1. Interview a local computer project manager about his or her network design. What is
the topology of their computer lab’s network? Why was that topology chosen? If this lab
manager were setting up a lab today would he or she choose the same design?
2.5.2. What sort of networking equipment (cards and adapters) does your computer (or the
one you most often use) have? Explore the hardware by looking at the exterior of your
computer and by using the tools in the operating system (such as the Device Manager in
Windows) until you find the answer to this question.
2.5.3. Interview a salesperson at a local ISP. What types of internet connections are available
in your area and what are the costs?
2.5.4. Interview a local network technician. What network topologies does he or she see most
often? What does he or she recommend for small computer labs?
2.5.5. Workshop Activity: As a class, analyze the network of the computer lab where your
workshop is taking place. What topology was used? How does the lab connect to the
Internet? What networking equipment was needed to set up the lab?
2.5.6. Workshop Activity: Participate in a role play on the following scenario: you are the lab
manager of a school computer project that cannot afford an internet connection at this
time. You are still interested in setting up a LAN so that there is an intranet connecting all
of the project computers. Discuss this with the school’s computer committee and
convince them that setting up this LAN is worth the time and expense.
Table of Contents
3. Networking Skill
3.1. Setting Up and Managing a Simple LAN and Internet Connection
3.1.1. Getting Started
10
Imagine that an ISP has just set up an Internet connection for a small computer project.
What’s next? Probably the computer lab manager will want to set up a simple LAN and then
use it to connect the computers to the Internet. This is can be done simply, as shown in the tip
box, and does not need to involve a server computer since the router can direct Internet traffic.
The lab manager will need to determine in advance whether to make the network
wired, wireless or a combination of the two. Wireless networks are simpler to set up but more
attention needs to be paid to security with wireless networks (see section 3.6). In addition, not
all desktop computers come with wireless adapters.
Tips for Setting up a Simple LAN
Imagine that a broadband Internet connection has just been installed at your project. Here
are the steps for setting up a small LAN to connect computers to the Internet.
1. Install a router. This is as simple as plugging it into an electrical outlet, and then using a
CAT-5 cable to connect it to the Internet source. The Internet source will vary with the
type of connection. For a WiMax connection, for example, you might be connecting
directly to an antenna or to a modem connected to the antenna.
2. Connect wired computers to the router. If the router has enough ports on the back for
all of the computers on your network, you can attach them directly using CAT-5 cable.
The router will act as the center of a star network. If the router does not have enough
ports, move on to step 3. You may also need to install the software that came with the
router onto one of the networked computers and use it to complete the initial setup for
the router.
3. Connect a switch to the router. This should be done if the router does not have enough
ports for all the computers on your network, or if a group of computers is in another
room. The switch connects to one of the ports in the router via a CAT-5 cable, and also
will require an electrical outlet. Computers then connect to the switch, forming a star
network.
4. Connect wireless computers to the router. If you have a wireless router and computers
with wireless adapters, connect each computer individually to the router by using the
tools in their operating systems for network connections (for Windows computers these
can be found in the control panel). If the router (or the switch) is not wireless or if
wireless access is needed in a different location, move on to step 5.
5. Connect a wireless access point to the router. If additional wireless access is needed,
scout out the best location for this access (so that as many computers as possible are in
range). Then connect the wireless access point to one of the ports in the router via a
CAT-5 cable.
3.1.2. Working with CAT-5 Cable
In the tip box for setting up a simple LAN, CAT-5 (or the faster CAT-5e) cable plays a
major role. It is needed to make connections to and from the router as well as any switches,
wireless access points and wired computers in the LAN. While CAT-5e patch cables in various
lengths can be purchased, it will be more economical for a computer lab manager to buy a
11
spool of CAT-5 cable and cut it into patch cables of the desired length. The lab manager will
need to attach RJ-45 connectors to each end of the cables cut (a process called terminating). A
crimping tool is required for this procedure. It is important to note that CAT-5 cables should
not be more than 100 meters in length, or the signals they carry become degraded. In addition,
a lab manager should be aware that after repeated handling some cables or RJ-45 connectors
will fail. The tip box here shows the steps for terminating a CAT-5 cable.
Tips for Terminating a Cable
1. Take a segment of CAT-5 (or CAT-5e) cable and cut it to the desired length. If you aren’t
sure the length you need – always err on the side of extra length. You can shorten a
cable later but you can’t make it longer again!
2. Gently cut around the outer plastic covering of the wire, 1.2 cm from one end of the
wire. You can use the cutting blade on the crimping tool to do this (see Figure 2). Make
sure, however that you do not cut the plastic coating on the inner wires. Strip away the
end section of the outer plastic cover and inspect the inner wires to make sure they are
in good condition. If they are not, cut off the damaged section of cable and start over.
3. Spread out the individual wires and order them according to colors as shown below
(from left to right):
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown
4. Once the wires are properly aligned, keep them neatly aligned and close together while
you cut off the uneven ends of the wires using the cutting blade on the crimping tool
(see Figure 3).
5. While keeping the wires properly aligned, insert them into an RJ-45 connector. There
are 8 small canals in the connector and one wire will fit into each canal. Make sure that
wires are aligned with the white/orange wire on the left and the golden pins of the RJ45 connector on top. The plastic tab will be on the bottom.
6. Insert the assembled connector into the crimping tool (there is only one way it fits) and
then press down firmly. This causes the pins to be pushed into the wires, making
electrical connections.
7. Repeat steps 2 - 6 on the other end of the cable.
8. Test the cable. The easiest way to do this is to use it to connect a computer to the
Internet. Use it to replace a cable in a set-up that you know works perfectly.
Figure 3 - Stripping the Cable
Photo courtesy of David Dionys, VVOB
12
Figure 2 - Trimming the Wires
Photo courtesy of David Dionys, VVOB
3.1.3. Working with IP Addresses
For most computer lab managers, the simple network set up in section 3.1.1 should be
“plug and play”. This means that after the computer lab manager completes the physical set
up, the network works automatically. The most important factor that allows this to happen is
that the router acts as a DHCP server. As described in section 2.1, this means that the router
assigns IP addresses to the
Tips for Finding a Computer’s IP Address
computers on the network, thus
allowing these computers to
Several methods are shown below. Which you choose
share information amongst
depends on your computer’s operating system.
themselves and with other
computers on the Internet. In
Method A: On a Windows computer, choose Start 
most cases the IP addresses that
Control Panel  Network and Internet. On a Windows
the router assigns will be
XP computer then choose Network Connections and
dynamic, which means that they
double click on the active Internet connection shown.
change after some time. The
On a Windows Vista computer then choose Network
router leases out a particular IP
and Sharing Center and click view status on the active
address for a specific period of
Internet connection shown. Then click on Details to see
time, often 24 hours. Since
the IP address.
there are a limited number of IP
addresses available for the
Method B: Open up the Command Prompt window on
router to use, this system
your computer. Command Prompt is a way of entering
prevents the IP addresses from
in commands directly (not through the typical graphic
being used up by computers that
interface). On a Windows computer the command
are not often on the network.
prompt line can be found in Start  All Programs 
The lab manager can view the IP
Accessories  Command Prompt. In the Command
address for a computer using a
Prompt window enter the text “ipconfig/all”.
variety of methods, described in
the tip box here. Changing IP
Method C: On an Ubuntu or Linux computer, open the
addresses will be covered in
Command Line by holding down the Ctrl and Alt keys
section 3.3. Note that IP
while pressing down the F1 key. Then enter your
addresses for computers on a
username and password if prompted to do so. You can
LAN will always begin with
also access the Command Line by selecting
192.168. This is the range of
Applications  Accessories  Terminal. Then enter in
addresses allotted for use on
the text “ifconfig”.
private networks. When a
computer on the LAN sends
information out to the internet, it passes through a firewall (usually part of the router) and the
firewall attaches a different (public) IP address to that information.
3.2. Managing Computers Using a Server
3.2.1. Introduction to Servers
Computer networks fall into two general categories: peer to peer networks and clientserver networks. In a peer to peer network, all computers are considered equals (peers) and
they share information equally between each other. In a client-server network, not all of the
13
devices are equal. The server distributes (or serves) information to all of the client computers,
and directs traffic amongst these computers and between these computers and the internet. In
the network described in section 3.1, there was no server computer, but the router was acting
as a server by distributing IP addresses to the client computers and also directing Internet
traffic.
For most small networks a server computer is not necessary, but it is an option to
consider in some situations. Server computers can take on a variety of roles. A few that might
be useful in a computer project are described here:
 File Server. A file server is a computer that provides centralized storage of files (or
programs) for the client computers. This is particularly useful for computer projects
that have large files that are beneficial for many users, but would take up too much
space to store on each computer. For example, educational materials such as digital
encyclopedias and textbooks can be stored on a file server and then accessed by all
clients. Computer projects that cannot afford Internet access can benefit greatly from
sharing information in this way.
 Domain Controller. A domain is a group of computers that is managed collectively with
common rules. A domain controller is the server that manages these rules including
user accounts and access privileges. This can be useful, for example, in a project that
has files that some users are permitted to access and others are not.
 Print Server. A print server collects documents that the client computers send to it and
then prints them. This allows a computer project to share a single printer between
many users.
 Web Server. A web server is a computer that hosts a web site. This web site can be
served either to the client computers (the project’s intranet) or it can be served out to
all of the computers on the Internet. It is particularly important that a web server
computer remain turned on at all times, or computer users on the Internet will not be
able to access the web site.
 Proxy Server. A proxy server acts as an intermediary between client computers and the
Internet, by processing requests for information before sending them on to the Internet
on behalf of the client. Proxy servers have three significant potential benefits for
computer projects. The first is that they can be used to log Internet usage by the clients,
thus enabling an organization to track and control the use of precious bandwidth. The
second is that they can be used to filter content, preventing clients from accessing
content that the organization deems as inappropriate. The third is that they can be
used to cache (temporarily store) information from the Internet for the client
computers to use. For example, imagine that there is a popular website that many
users are accessing (such as www.google.com). The first time a client computer
requests access to this website, the proxy server retrieves the information from the
Internet. When the next user requests Google, however, the information is already
stored on the proxy server and access is much quicker.
 Mail Server. A mail server allows an organization to collect and distribute email for
different clients. These servers run special email management software such as
Microsoft Exchange Server. Having a mail server allows for more sophisticated email
14
management and collaboration tools than most Internet email services, but Internet
email services have improved significantly in recent years.
3.2.2. Server Equipment and Software
If a computer project steering committee or board decides to install a dedicated server
computer, the computer lab manager will need to investigate purchase choices carefully. Since
the client computers will be dependent upon the server computer in some way, it is important
that the machine be reliable and
fast. A standard desktop
Tips for Choosing a Server Operating System
computer will be a suitable server
if it has a fast and reliable CPU
Below are questions for a lab manager to answer when
(such as a recent Intel chip), a
choosing a server operating system:
large amount of RAM, and a large
1. Do I have a licensed copy of the server software?
hard drive. The server should also
This is important when choosing proprietary
have good options for later
software, such as Microsoft. The lab manager also
expansion such as several USB
needs to make sure that the license allows for the
ports for adding external devices,
correct number of client computers to connect to
and space for adding additional
the server.
internal hard drives.
2. Will the software be easy for me to use? This will
depend on what platform (such as Windows or
A server computer also
Linux) the manager is most familiar with. In
typically runs on a server
general, it will be easier to find help resources for
operating system, as opposed to
proprietary software like Microsoft.
the standard operating systems
3. Do I have (or will I be able to find) the drivers
that users are familiar with. For
(software to run peripheral equipment) that work
example, there are various
with this operating system?
Windows and Linux versions of
4. Is the other software that I want to run compatible
server operating systems (such as
with this operating system?
Windows Server 2003 and Red
5. Is the operating system susceptible to viruses? A
Hat Linux). All sever operating
Linux operating system is much less susceptible to
systems have advantages and
viruses than a Microsoft operating system. Also
disadvantages that need to be
typically the free antivirus software programs are
considered carefully. Before
not compatible with server software.
choosing and installing an
operating system, a computer lab
manager should answer the questions in the tip box here.
3.2.3. Installing and Configuring a Server
It is outside the scope of this module to give a computer lab manager a full training
course in how to set up and use a server. However, for those lab managers who are interested
in learning more, the tasks that would be involved in the set up a server for a computer project
are listed here:
 Choosing server hardware (see section 3.2.2)
 Choosing server software (see section 3.2.2)
15





Connecting the server to the network. The server can be connected to a switch that is
also connected to client computers.
Install server software. This process is very similar to installing an operating system for
a standard computer.
Configure server roles. This process involves setting up the server so that it performs the
roles (listed in section 3.2.1) desired for the network.
Install drivers for peripheral devices
Install antivirus software
A useful tutorial for setting up a home server (which could also be used for a small
computer project) using an open source operating system is found at:
http://www.webmonkey.com/2010/02/set_up_a_home_server/. The Windows Reference
website (www.windowsreference.com) provides some relevant tutorials for the installation of
Windows server software.
3.3. Troubleshooting Network Failures
One of the more frustrating experiences for a computer user is to get set up to check
email or search for information
Tips for Troubleshooting a Computer that Won’t
on the Internet, only to discover
Connect to a Network
that there is no Internet service.
Network failures like this can be
1. If the operating system has network diagnostic
external (due to a problem with
tools, run these to see if the computer can fix the
the ISP or the project’s
problem itself. For a Windows computer, follow
connection to the ISP) or
the steps in the tip box in section 3.1.3 (Method A)
internal (due to a problem with
to view a network connection and then click on the
the LAN). A user can also
“Diagnose” box. Also notice whether or not the
experience network problems
computer is sending or receiving any packets from
that are due to hardware or
the network. If the network diagram shows some
software issues with an
packets being received gradually, then the
individual computer. Once it is
connection is just working slowly.
determined whether the
2. Try getting a new IP address. For a Windows
problem is with a particular
computer go to the command prompt line (see the
computer (can other users reach
tip box in section 3.1.3) and type and Enter
the network?) or network-wide,
“ipconfig/release” and then “ipconfig/renew”.
then troubleshooting can begin.
3. Restart the computer. This often will fix temporary
problems with hardware or software.
3.3.1. Failures With a Particular
4. Use the Device Manager, which can found on many
Computer
Windows computers (for Windows XP go to Start 
If a particular computer
Control Panel  System  Device Manager). If a
cannot connect to a LAN or the
network device has a (hardware) problem, a
Internet when other computers
warning symbol will be displayed next to it, and
in the same area can, the first
double clicking on that device would give details
step is to determine if the
and suggested remedies for the problem.
specific location is the cause of
16
the problem. For example, if the computer is connecting wirelessly – is the signal particularly
weak there? Moving the computer to a different location where another computer connected
successfully would test this theory. If connected by cables, the computer lab manager could try
swapping patch cables with one that is known to work. Once a problem with the patch cable
has been eliminated, the next step would be to swap the troubled computer with one that
connected successfully in another location. If the new computer cannot connect in this
location, then the problem could be with connectors, switches or router ports that the
computer work station ultimately connects to. If the swapped computer can connect, however,
the lab manager has determined that the problem is with the individual computer and not with
the location. In this case the tip box here (above) gives some good troubleshooting
suggestions.
3.3.2. Failures with an Entire Network
In some situations, no computer on a LAN can access either the local intranet or the
Internet. In these cases, it is helpful to try and distinguish between the two problems. For a
Windows computer, the Network Connections or Network and Sharing Center (see the tip box
in section 3.1.3) shows the status of a connection, including whether it is local only or local and
Internet. The lights on the front of a router can also be used to indicate whether or not it is
connected to the Internet. Another useful diagnostic tool is to use a computer on the LAN to
ping various devices on the LAN and see which ones can be reached. Pinging means sending a
packet of information and requesting a packet in reply. The tip box here describes how to ping.
Tips for Pinging Networked Devices
Pinging is the process of sending a packet of information over a network and requesting a reply. The
main requirement for pinging is that you know the IP address (or web address) of the device you are
going to ping. Below are the steps to take when using pinging as a part of troubleshooting.
1. Open up the Command Prompt (or Command Line for Ubuntu) window on your computer.
2. To ping any device from a Windows computer you type “ping” then a space then the IP address
for that device. For computers with the Ubuntu operating system, you type “ping -c 4” then a
space then the IP address for that device. The standard address (127.0.0.1) is used for a
computer to refer to itself. So you would type “ping 127.0.0.1” or “ping –c 4 127.0.0.1” to ping
your own computer. Once you enter the command, the computer will send packets and report
on whether replies were received and how much time elapsed.
3. Next try to ping the router for your LAN using the procedure above. Usually the IP address for a
router is 192.168.0.1. If this is not correct, check your router’s user’s manual.
4. Next try to ping the server computer or another computer on the LAN. Use the tip box in
section 3.1.3 to find the IP addresses for these computers.
5. Finally try to ping an external website. You can use the IP address for that website if you know
it, or just enter the web address. For example: “ping www.google.com” or “ping –c 4
www.google.com”.
Once it has been determined that the problem is not with the LAN but with the Internet
or the Internet connection to the router, the computer lab manager now has a narrower range
of possibilities to address. The first step to take in these instances is to make sure the router is
17
functioning properly. The computer lab manager should reboot the router (turn it off or unplug
electricity to the router, wait a few seconds then turn it on again) first to see if that solves the
problem. If not, the lights on the front of the router (along with the router user’s guide) can be
used to indicate whether or not it is functioning properly. The computer lab manager can also
try rebooting the modem, WiFi receiver or any other devices used for receiving the Internet
signal. A computer lab manager may also have some software for diagnosing network
problems that is installed on the server or another computer.
If none of the above steps
solve the problem, the next step
is for the computer lab manager
to contact the ISP and ask for
assistance. The customer
support desk at an ISP should be
able to diagnose some problems
and help troubleshoot others.
The tip box here includes some
suggestions for a computer lab
manager to use when calling an
ISP for support.
Tips for Calling ISP Customer Support
Customer support from the ISP is an important “tool”
when dealing with a network problem. However, it is
important not to call until you are fully prepared since
phone calls can be expensive. Below are steps to take
before and during a call to customer support.
1. Make sure you are dealing with a problem with the
Internet connection and not just the LAN (as
described in section 3.3.2).
2. Troubleshoot the network first to the best of your
abilities, including rebooting the router and the
modem (or other device used to receive the
Internet signal).
3. Write down everything you would like to tell the
customer support person – including when the
trouble started, whether the network connection is
intermittent or has totally failed, and what
troubleshooting steps you have tried.
4. Call the ISP. As soon as you are sure you are talking
to a knowledgeable support staff member, tell
them everything on your list.
5. The customer support person may say that they
need to investigate the problem and get back to
you. Before they hang up, make sure you get their
name and phone number and that you have made a
follow up plan. Will they call back or do you need
to? How long should you wait before calling again?
6. Make sure you “close the loop” with the customer
support person later. It is important to let the ISP
know whether or not the repair was successful.
3.4. Shared Printers
As mentioned previously,
one advantage of having a LAN
is to allow for shared printers.
Buying and networking a single
printer for shared use is much
more cost effective than buying
printers for each computer (or
requiring users to transfer
documents to the computer
with the attached printer). It is
also more efficient than having a
single non-networked printer
and requiring all users to bring
their documents (via flash drive,
disk or email) to the attached
computer. Once a computer lab
has a networked printer,
however, it is possible that
computer users will print documents indiscriminately and waste precious ink and paper. The
project’s computer committee should consider developing a printing policy to avoid this waste.
3.4.1. Setting Up a Network Printer or a Shared Printer
18
Equipment. There are several equipment options for setting up a networked printer.
The simplest of these is to buy a network printer. Network printers are available in both wired
and wireless models. The wired network printer would be connected via CAT-5 cable to the
router or switch. If a network printer is not available or affordable, a second option is to
purchase a print server. This small device attaches to a printer and then attaches to the
network as above. Print servers are available in both wired and wireless models. Before
purchasing a print server, a computer lab manager should make sure that it has ports (such as
USB or parallel) that are compatible with the existing printer. A third option for networking a
printer is to attach a printer to a computer that is attached to the network. This computer then
can share that printer on the network and manage the print queue for that printer. The
methods for sharing a printer and printing to a shared printer depend on the computer
operating system in use. Information can be found by searching a computer’s help file for
“share printer”.
Communication. Once a computer has been attached to the LAN (via the first or second
options above), it should automatically be assigned an IP address by the router. With this IP
address, a computer user can print directly to the printer from any computer on the LAN.
Before printing the first time, each computer will need to add the printer to its list of available
printers. For Windows computers this can be done through the “Add a Printer” wizard. This
tool can be found through Start  Control Panel Hardware and Sound (or Printers and
Other Hardware) Printers. In most cases, this wizard will help the user find the printer
through browsing. If the printer is not automatically found, however, the user may need to
enter the IP address for the printer. If this is necessary, the IP address can be found by printing
a configuration page at the printer. For computer projects that have large networks and users
that print frequently, another communication option to consider is setting up a print server on
a server computer. Typically, server operating systems include a print server application that
allows the server to manage the print queue. This offers added printing control options such as
prioritizing some printing jobs over others, or controlling access to the printer to prevent
unauthorized printing. The full procedure for setting up a print server application is outside
the scope of this document, but computer lab managers can find information on how to do so
through Internet searches and their server operating system help files.
3.4.2. Troubleshooting Network Printers
Troubleshooting a problem with a networked printer should begin in the same way that
a computer lab manager would troubleshoot challenges with a non-networked printer. For the
details, see section 5.8 in Module 1 of this training course. It is particularly important to note,
however, that every computer that uses a networked printer must have the driver for that
printer installed. Other troubleshooting techniques for network printers include pinging
(described in section 3.3.2) the printer using its IP address, checking network cables and
rebooting the print server.
3.5. Maintaining Internet Security
The Internet is a wonderful tool for communicating, sharing and learning. The benefits
of Internet use are discussed in Module 3 this course and further benefits will be presented in
19
chapter 4, below. However, it is important to note that connecting a computer or a LAN to the
Internet makes the connected computers and users much more vulnerable to a variety of
potential problems. The risks for connected computers include an increased likelihood of virus
(or other malware) attacks and the possibility of unauthorized access to the networked
computers. In addition, computer users are much more likely to come across content that is
inappropriate or unreliable. Each of these risks and ways to minimize them are addressed in
the subsections below.
3.5.1. Preventing Unauthorized Access/Traffic
There are computer users (commonly known as hackers) who access computer systems
without authorization and usually for malicious reasons. They might be interested in accessing
sensitive information, or they might be distributing viruses and other malware in order to harm
the networked computers. The main defense against hackers and malware from the internet is
to set up a firewall. A firewall prevents network access from undesired users by analyzing and
filtering internet traffic (called packet filtering) and only letting the desired internet traffic
through. Firewalls can also be set up to block certain IP addresses (or URLs) from the network.
Many computer networks have multiple firewalls operating at the same time. Three common
types of firewalls are described below:
Router Firewalls. Most routers include a simple firewall that at least acts as a packet
filter. Some routers can also be programmed to block certain IP addresses or only allow traffic
from certain IP addresses. In many cases, a computer user can access a router’s software by
opening a new window in an Internet browser and typing in the IP address for the router
(usually 192.168.0.1). This allows the user to see and adjust the router firewall settings.
Individual Computer Software Firewalls. Many operating systems come with some
firewall software included that protects that computer individually from unauthorized access.
The Windows Firewall is one example of this. This software can be found and turned on or off
through Start  Control Panel  Security  Windows Firewall. For Ubuntu computers, a free
firewall program called Firestarter (www.fs-security.com) can be downloaded and installed.
Server Computer Firewalls. While a combination of the above two types of firewalls is
sufficient for most small networks, setting up a firewall on a dedicated server is a good option
to consider for computer lab managers that desire greater protection or flexibility in controlling
access. Server firewalls also allow for easier monitoring of network traffic than router firewalls.
One example of a free server firewall program is Untangle (www.untangle.com). Untangle can
be set up to run in three ways: on a dedicated server also acting as a router, as a dedicated
server between the router and the LAN or on one of the client computers on the LAN.
Another source of unauthorized network access to be aware of is through wireless
routers and wireless access points. These devices can be set up to provide secure or unsecure
wireless networks. Unsecure networks are often used in Internet cafés for ease of access by
customers with their own laptops. For private computer projects, however, a secure network is
preferred since it protects against access by hackers or by outside individuals who want free
20
bandwidth. Setting up a secure wireless network is done when installing a wireless router or
access point. The user manual for the device should be consulted for the details. When setting
up the secure network, the computer lab manager will assign a security key to the wireless
router or access point. The first time an individual computer connects to that network, the user
will be asked to enter the security key.
3.5.2. Virus Prevention
One way for viruses (and other malware) to enter a computer network is through the
unintentional downloading of malware program from the Internet. All computers (servers and
clients) should have their own anti-virus software installed and periodically scanning. Anti-virus
software is discussed more fully in section3.3 of Module 1. Preventing malware from entering a
computer network in the first place, however, offers an additional level of anti-virus protection.
Many firewall programs include anti-virus protection, and it is wise for a computer lab manager
to make sure that this protection is enabled.
3.5.3. Inappropriate Use
Many organizations have struggled with inappropriate use of their Internet connections,
and have chosen to take action against this use. The term inappropriate use is broad enough to
include a variety of categories, such as those shown below:
Inappropriate Content. In many cases, due to age, culture or local laws, it is
inappropriate for users to access certain types of websites. The most common example is
pornography websites, but there are many other categories of blocked websites that vary
around the world. Often organizations will find that there are conflicting values that make it
challenging to know which websites to block.
Bandwidth Wasting. For many computer projects in developing countries, Internet
connections come with limitations on the amount data that can be downloaded or uploaded.
Once the monthly limit has been reached, Internet usage is cut off or significantly curtailed. In
addition, often Internet speeds are quite slow during peak use hours and become even slower
when users are downloading large files. As a result, organizations will often block access to
websites that are used to transfer large files (such as videos and music).
Time/Productivity Wasting. Many Internet users have discovered the excitement of
social networking sites (see section 4.3) or the entertainment available through Internet games,
music and videos. Often, however, people struggle to keep the “quick break” from work from
turning into a long distraction from work. These distractions typically are worse when
computer users are in private locations, where others cannot see their activity. As a result,
some organizations choose to arrange desks and computers in a way that limits privacy for
computer users. Other organizations prohibit staff and/or clients from using games, social
networking or other entertainment websites. Some organizations will also block access to
these websites, as described below.
21
Each organization needs to determine for themselves what constitutes inappropriate
use and how they intend to address the problems. Once an organization has decided what uses
are inappropriate, however, they should make a significant effort to educate users on which
activities are prohibited and why. Frequent reminders can also be helpful. If a computer lab
manager has access to reports of network traffic (from a router, server or ISP) he or she can
analyze that traffic to see which types of inappropriate use are still regularly occurring, and
target reminders to that sort of traffic. It is also possible to physically block access to certain
websites or categories of websites. This can be done in a variety of ways. For example, some
ISPs will filter out inappropriate websites (based on their content) at the request of their
clients. Routers can also be used to block particular web addresses, and some firewall
programs (such as Untangle, described in section 3.5.1) can both filter and block.
3.6. Assignments/Activities
3.6.1. Interview a field technician from a local ISP. This should be a person who responds to
customer problems by visiting their sites and diagnosing and repairing network problems.
What are the most common network problems that he or she sees? How can these
problems be avoided?
3.6.2. Connect a laptop wirelessly at an Internet café. Then take some time to investigate
properties and performance of the Internet connection. How fast are packets being sent
and received? What is the IP address for the laptop?
3.6.3. Use the command line (command prompt) on a networked computer to view, release
and renew an IP address. Can you tell how long the new IP address is leased for?
3.6.4. Practice using the help files on a computer or online searches to address network
problems. You can ask a local lab manager to supply you with questions to address, or
here are a few examples: How do you view and empty the queue of a shared printer? How
can you get a static IP address for a computer? What are the advantages of static (versus
the usual, dynamic) IP addresses? What is Peer to Peer network traffic and how can it be
blocked?
3.6.5. Draw a map of the computer network at your project or a local Internet café. Show all
computers, switches, routers, servers and network printers. Show how they connect to
each other and to the Internet.
3.6.6. Add a network or shared printer to a client computer in a computer network. See
section 3.4.1 for details.
3.6.7. Evaluate the security of your network. Is it sufficient for the needs of your organization?
Also consider the security of any wireless routers or wireless access points. Can outsiders
gain access to your network either inside or outside your buildings?
3.6.8. Is the router on your network (or the network of a local Internet café) acting as a
firewall? If so, what firewall tasks is it performing? To find this information, look for the
user manual for the router or router management software. You can also access the
router via an Internet browser by entering the IP address for the router (usually
192.168.0.1) in the address bar.
3.6.9. Perform some web research about Internet content filters. Find out how they work.
For example, do they filter by name, key word or URL? Do they require a dedicated server
computer or can they be loaded on a client computer? After your research, discuss
22
whether or not you think that a content filter would be a good choice for your
organization.
3.6.10. Workshop Activity: Practice pinging various locations on the network where your
training course is taking place. Make sure to note the time it takes for packets to be
returned from various locations.
3.6.11. Workshop Activity: As a group, troubleshoot various network failures. Your instructor
should cause these failures and then offer the group time and guidance as they determine
what he or she disabled.
3.6.12. Workshop Activity: As a group, install server software on a computer and set up the
server to perform some common roles/tasks.
3.6.13. Workshop Activity: Investigate the firewalls on the individual computers and the router
in the computer lab where your workshop is being held. What kind of content is being
blocked? Are the firewall settings appropriate for that particular computer lab?
3.6.14. Workshop Activity: Participate in a discussion on inappropriate use of the Internet.
What is inappropriate in your computer projects? In particular make sure to address some
of the challenging questions such as: How do you distinguish between pornography and
art? Should video downloads be prohibited entirely even though some videos are
educational? How do you find the balance between allowing users open access to
information but yet prohibiting information that is culturally or politically inappropriate?
Can computer lab rules and user education suffice or is Internet blocking software
needed?
Table of Contents
4. Using The Internet
The first part of this module has focused on the technical skill behind networking and
connecting to the Internet. The remainder of this module will focus on what computer lab
users can do with an Internet connection once it has been established. The Internet is an
amazing tool for learning and collaboration and should be taken full advantage of. Some basic
Internet use skills are discussed in Module 3 of this training course. Most notably, that module
includes information on performing successful Internet searches. The sections below focus on
using the Internet for communication and collaboration.
4.1. Using Email
4.1.1. Sending Messages
By the time most computer lab managers have reached Module 4 in this training guide,
they probably have already established an email account and started using it as a tool for
communicating with friends, coworkers and project partners. Therefore this guide does not
focus on the details of how to initially set up an email account. However, if there are readers
who do not yet have email accounts, they should be encouraged to visit www.gmail.com,
www.yahoo.com or www.hotmail.com to set up an email account with one of these free email
providers.
23
Many email users,
Tips for Composing and Sending Professional Email
however, have not fully studied
Messages
the options available to them
when writing and sending emails.
Email messages should demonstrate that you are
The tip box here gives some good
professional, well educated and appropriate. To make
advice on how to proceed when
sure that this is the case, follow the steps below. For
composing and sending an email.
further information on this topic, see section 4.2
After an email is received, a
1. Make sure that your email includes a subject line
reader has various options as
that informs about the content of the message.
well. These are described here:
2. Consider who should receive your email. Put all of
 Reply. This is the
their email addresses in the “To” box. Use the “Cc”
standard option to select
(Carbon Copy) option for addresses of people who
to send off an email
might benefit from the information but are not
composed in reply to one
expected to reply. Use the “Bcc” (Blind Carbon
that was received. The
Copy) option to also send the email to anyone you
important thing to be
would like to receive the email without the other
aware of is that this reply
recipients knowing that he or she is included.
will go only to the
3. Make sure that you compose an email message
sender. If there were
with the appropriate tone. Avoid making
other people who
statements that you think might anger the
received the original
recipients or that you would be embarrassed to
email (either in the To or
make in person.
Cc lines) they will not
4. Use the spell and grammar checkers available in
receive this reply. The
your email service. Spelling and grammar errors are
one exception to this
not professional and can also confuse the meaning
statement is that some
of an email.
email discussion groups
5. Proofread your email before sending it. Check for
(described in section
tone and errors. If it is a particularly sensitive or
4.1.3) are set up so that
important email, get someone else to proofread it
the reply goes the entire
too. Also check and make sure that you have
group.
correctly typed the email addresses of all recipients.
 Reply All. This is the
6. Now you are ready to press “Send”!
option to select to send
off an email composed in reply to another email, when it is beneficial for everyone who
received the original email to also see the reply.
 Forward. Perhaps there is someone who did not receive an email but should be
informed about the contents. The email can then be forwarded to that person by
selecting the “Forward” button and then typing in the email address of the person who
should receive the email.
4.1.2. Attachments
Attachments are files that are sent along with email messages. It can be very
convenient to send documents (such as reports) as email attachments so that these documents
are preserved without any changes. Photos also can be sent as email attachments. Most
24
Internet email providers do have
restrictions on what sort of
materials can be attached to
email messages. For example,
programs usually cannot be
attached because of the risk that
they might be viruses. There also
is usually a size limit (such as 1 or
2 MB) on attachments, to
prevent excessive use of
bandwidth and storage. The tip
box here provides instruction on
using email attachments.
4.1.3. Email Discussion Groups
Email discussion groups
(also called D-groups, email lists
and list serves) are wonderful
tools for connecting with a group
of individuals that share a
particular interest. With an email
discussion group, a single email
sent to the group email address
is then received by every
member of the group. This is
much easier than trying to keep
track of dozens of email
addresses separately!
Tips for Using Email Attachments
The instructions below are based on the Gmail (Google
Mail) email service, but are similar to those found with
other email providers.
Follow these steps for attaching a file:
1. Compose a new email as usual.
2. Find the words “Attach a file” below the email
subject and click on them. A paper clip image is
next to the words.
3. A new window opens showing files stored on the
computer. Browse as needed to find the desired
file, and then double click on it to upload.
4. Allow some time for the file to be fully uploaded,
then click on “Save” to save the draft email. As
usual, proofread the email before choosing “Send”.
Follow these steps for viewing and saving
attachments:
1. When you receive an email, a paper clip image near
the top of the email will indicate that it has an
attachment.
2. Near the bottom of the email, the title or a small
image of the attached file will be shown. Next to
the image you will see the words “View” or
“Download”. Click on “View” if you want to open
the attachment but not save it to your computer.
Click “Download” if you want to save the file to your
computer. You will then be given a choice to open
the file or save it. Click on “Save” and browse for
the location you would like to save it to on the
computer.
3. A note of caution: email attachments can be used
to spread viruses. Avoid opening attachments if
they are not from known senders and are not
clearly explained in the email message.
Groups exist on a variety
of topics and can either be public
or private. Some groups are not
moderated, meaning anyone can
send a message to the group
independently. These groups
tend to have the most free and
open participation, but can get
off topic or be vulnerable to spam (described in the next section). Other groups are moderated,
meaning that there is a manager that views and approves email messages before they are sent
to the group. Then there are groups that are not really for discussion at all (these are often just
called email lists), but are used for organizations to disseminate information to interested
parties.
25
Public email discussion groups and email lists can sometimes be found by going to the
websites of organizations of interest. It is also possible to find these groups by going to the
Google Groups (http://groups.google.com) or Yahoo Groups (http://groups.yahoo.com)
websites and searching (or browsing) for topics of interest. Once an interesting public group is
found, anyone can request to join a group. Depending on how the group has been set up,
moderators may or may not need to approve membership requests. Anyone with a Google or
Yahoo email account can also go to the websites mentioned above and form his or her own
group. This is a useful option, for example, for sharing information amongst members of a large
committee or interest group.
When sending messages (also called posts) to email discussion groups, it’s important to
be aware of the proper etiquette for that particular group. For example, the user should know
whether or not it is important for all messages adhere to the specific topic or purpose of the
group. It is also important to be mindful of language and avoid using slang or profanity unless it
is clearly acceptable to the group. In addition, group members should become aware of the
reply settings of the group. Some groups have been set up so that using Reply sends a message
to the sender and Reply All sends a message to everyone on the list. Other groups are set up so
that Reply goes to everyone on the list. It would be quite unfortunate to reply with a personal
response for one individual (imagine making arrangements for a dinner date) that everyone on
the list saw!
4.1.4. Spam and Scams
Unfortunately, email users need to be wary of the email messages they receive. While
most email messages are useful and appropriate, a certain number of email messages are
unauthentic, malicious or just annoying. These fall into the two categories described below:
spam and scams.
Spam (also called junk email) is the term used to describe email messages that are sent
out in large quantity to email addresses that have been collected through web searches,
accessing address books, and other methods. In most cases, spam is sent through automated
systems that allow the spammers (people sending spam) to send email messages in large
volume and with some customization so that the email looks like it is sent directly and
individually to the recipient. Most spam messages appear to be promotions for specific
businesses or products (such as medications). Some spammers are using this annoying
technique to promote legitimate businesses, but spam can also be used as a part of scams (see
next paragraph) or as a way to deliver malware to a computer. Fortunately, most email
services now have effective spam filtering that directs spam emails to a separate spam folder.
No spam filter is perfect, however, and as a result spam will occasionally end up in an email
user’s inbox and non-spam emails will occasionally end up in the user’s spam folder. An email
user should occasionally open the spam folder in his or her email account to see if emails from
known senders have been sent there accidentally, and then delete the spam messages being
stored there. In addition, if an email user believes that an email in his or her inbox looks like
spam or is otherwise suspicious, he or she should delete it or report it as spam to the email
26
provider. It also is never a good idea to open or download email attachments from unknown
senders.
Scams take advantage of email users in a variety of unfortunate ways. Typically a scam
appears to be a genuine request for information or funds, but is in fact a way to extract
personal information or money from unsuspecting email users. Below are some examples of
common email scams:
 Fake Bank Alerts. Some scams appear to be from banks or other financial institutions.
They ask users to reply and give information from their accounts such as bank account
numbers or ATM (cash machine) pin numbers in order to solve problems or verify
accounts. Typically scammers use this information to gain access to a bank account
illegally. Email users should be wary of such requests and never give out this type of
information over email. If in doubt, the user should call the financial institution or visit
their website.
 Fake Email Account Problems. Some scams appear to be from email hosts such as
Yahoo or Gmail, requesting passwords in order to verify an account or solve a problem.
In reality they are from scammers who want to access and then hijack (by changing the
password) an email account. Then scammers can send email messages that appear to
be from the account owner (such as those in the next scam described). Email users
should never give out their password over email. If they are in doubt about a particular
email, the best action is to contact the customer service department of the email host
through their web page.
 Fake “Friends in Trouble”. In this scam, an email user receives an email that appears to
come from a friend, complete with the correct email address. Typically the email claims
that the friend has had a problem (such as a failed credit card) while traveling and is in
need of immediate cash. Usually these emails are revealed as scams because the
scammer has a different writing style than the actual friend, or the actual friend is
known not to be in the city that they claim to be stranded in.
 Fake “Princes in Exile”. In this classic email scam, the sender is pretending to be royalty
in exile from some troubled country. They appeal to the honor of the recipient to help
them somehow access their fortunes. The method of access varies, but the sender
usually asks for the bank information of the recipient and promises to share the riches
with him or her.
 Fake Job or Immigration Opportunities. These scammers claim to offer easy access to a
desirable job or immigration status (such as a “green card” for the USA) if the reader will
only pay a “service fee” or provide some personal information.
 Prize Scams. Sometimes emails get forwarded that state claims about prizes to be
earned by easy methods such as forwarding emails to friends or replying to enter
contests. Some of these scams are just harmless jokes, but others are used as ways to
obtain email addresses or other personal information. Email users should also be wary
of emails that suggest that they have already won a lottery, prize or scholarship.
Typically these scammers ask for money (for prize shipping costs or to pay for a small
portion of the scholarship) or bank deposit information.
27
In general, if an email describes an opportunity that seems “too good to be true” then it
probably is. If an email asks for personal information or funds it is also probably a scam. If in
doubt, however, it is possible to do a web search on the title of the email and see if it comes up
as a known scam. Email users also should never reply directly to email messages that appear to
be from financial institutions, email hosts or other online companies they have accounts with.
They should instead go to the websites for those companies (using the web addresses they
know are valid) and log in to their accounts. If the email messages were genuine, the same
information will be found on the website.
Email scams such as those described above prey most effectively on people who are
new to the “electronic world” and do not yet understand the importance of self-defense and
skepticism when communicating electronically. Therefore, it is quite important for computer
lab managers to educate new computer users on the risks involved in email communication. In
general, it is also important to make sure computer users understand that not everything that
they see in an email or on the Internet is true. Email and the Internet are wonderful tools for
freely sharing information and ideas, but this freedom is due to the fact that there is very little
supervision or regulation of content.
4.2. Effective Email Communication
As new computer users become more familiar with email, it is important for these users
to learn how to use email effectively and appropriately. There are certain social and business
standards for appropriate email communication, just as there are standards that we use in
letters and face-to-face communication. Listed below are some significant standards and
issues in email communication that it is important for all email users to be aware of. It is also
important, however, for an email user to find out if there are other standards that are
appropriate for the people that they usually correspond with.
4.2.1. Subject Lines
The subject line is an important tool for people who receive many emails a day. It can be
used to help them sort emails or prioritize when they read and respond to emails. An
appropriate subject line also can help people find an email in their inbox to refer back to after
some time. Good subject lines, like good document names, are brief (if possible) and specific.
For example, if an email contained minutes from a recent committee meeting, a good subject
line would indicate that the email contained minutes for a meeting of a specific organization on
a specific date. An example of this would be “Minutes Graduation Planning Comm 10-242009”. In another example, if an email is being used to introduce a new idea to a colleague,
the subject should not be “Greetings” or even “An Idea” but something more specific such as
“Pupil IT Course Improvement Idea”.
4.2.2. Tone, Style, and Other Etiquette Issues
The etiquette for email communications is going to vary depending on the local culture
and the context (such as business or pleasure) of the email messages. Below are some major
factors to keep in mind when communicating via email.
28
Tone. In most cases it is important to keep the tone of email messages positive and
productive. Most recipients will appreciate the effort and be more likely to respond than if an
email message portrays anger or frustration. It is also possible that emails meant for one
recipient will be forwarded to others, so senders should think carefully before including
information that is sensitive or inflammatory.
Style. The style of an email message depends significantly on the context and the
audience for the email. For business situations, it is probably best to err on the side of
formality and include greetings, closings and thanks for assistance/involvement as appropriate.
It is also generally good in business situations to proofread emails and make sure that the
grammar and spelling are correct.
Language. Language use also depends on context, but is worth considering carefully.
Avoid using words that some recipients might find offensive or might not understand.
Replying. What happens when an email is sent and no one replies? If the email was
designed to start a conversation or collect information the sender often ends up feeling quite
frustrated. The sender is usually unclear about why there was no response: Did they use the
wrong email address? Is the recipient not interested in the topic? Or is the recipient too busy to
reply? Therefore it is good etiquette to reply promptly to emails received unless they are
clearly sent to a large group and as information only. These replies can be brief statements,
including “I got your email but am busy and will get back to you soon” or “thanks for including
me but I am not available to help with this project now”.
4.2.3. Cross Cultural Issues
Cross cultural communication can be very challenging. Even amongst English speakers,
there are huge variations in the way the language is used in different countries. There are also
many different cultural norms that are reflected in communication. For example, in some
cultures greeting rituals are very important and should always be carried out before the topic of
a meeting is discussed. Also cultural standards for disagreeing or sharing bad news vary widely.
In some cultures it is disrespectful to disagree with people who are perceived to be superior,
whereas in other cultures it is considered disrespectful to withhold information, even if that
information contradicts what others are saying.
Unfortunately email does not come with body language and facial expressions that help
people manage challenging communication situations. It is therefore helpful if people seek out
face to face opportunities to communicate cross culturally as well. When email is the best or
most efficient way to communicate, the tip box here gives some general advice for being
culturally sensitive.
29
Tips for Cross Cultural Email Communication
1. Include formal greetings (such as “Dear Mr. Tembo”) and closings (such as “Sincerely,
Grace Banda”) in all emails until it is clear that a higher level of familiarity has been
reached.
2. Err on the side of respect. This includes showing gratitude for the time your
correspondent is giving to work with you. Assume that all correspondents are busy
individuals who are valuable members of their communities.
3. Avoid discussing topics that might be culturally sensitive (such as religion or politics)
unless these are specifically a part of the reason you are writing. If these topics are a
part of your email subject, do not assume that the reader shares your same religious
or political views.
4. Avoid using slang, abbreviations or acronyms that your readers might be unfamiliar
with. For example, the acronym LOL (meaning “laughing out loud”) is going to be very
familiar amongst young people who often send text (SMS) messages, but may be
baffling to others.
4.3. Web 2.0: Part I – Web 2.0 for Communication
The term Web 2.0 represents the concept of “second generation” uses of the Internet.
The general idea is that in the first generation of the Internet, the information presented on
the Internet changed slowly and was entirely under the control of the individuals or
organizations that hosted web pages, but in Web 2.0 information is produced and shared more
collaboratively. The term Web 2.0 is now used to describe a collection of web applications
that allow users to share information quickly and create collaborative and dynamic web
content. In short, Web 2.0 applications change Internet users from being passive recipients of
information to being actively involved in creating that information. There are different
opinions about which web applications are considered Web 2.0 and whether or not the term
Web 2.0 is necessary. Below is this author’s list of useful applications (for computer lab
managers) that could be considered Web 2.0. In this section the applications described have
to do with using the Internet for communication. In the next section the focus is on using the
Internet for group collaboration, organization and teaching.
Readers who would like more examples of how Web 2.0 can be useful for development
work are encouraged to visit the Web 2.0 for Development Gateway website:
www.web2fordev.net. One good resource there is a video about Web 2.0 use in African
agriculture projects: http://www.web2fordev.net/component/content/article/1-latestnews/65-part-video-translation. For people working on educational projects, a free e-book of
Web 2.0 educational projects is available from www.ictineducation.org/free-stuff/.
4.3.1. Online Chatting
Online chatting allows computer users to have a typed conversation in real time over
the Internet. A user types a short note to a friend who is also online, and clicks Enter to send
30
the chat. The friend immediately sees the chat and can reply similarly. Web email providers
(such as Yahoo Mail and Gmail) offer online chatting, and chatting is also a feature of some
social networking sites (described below). Chatting can be difficult with slow Internet
connections.
4.3.2. VOIP
Voice over Internet Protocol (VOIP) is the term used for Internet phone services. These
services allow users to use a microphone and headphones or speakers to have an audio
conversation over the computer as though it was a telephone. One well known VOIP service is
Skype (www.skype.com). A VOIP service can be used to call cell phones, land line phones or
other computers with the same VOIP service. The costs for these services vary and depend on
the country and type of phone being called. Skype calls between two computers are free. It is
important to note, however, that VOIP services are illegal in some countries. Users should
consult local laws before proceeding.
4.3.3. Blogs
Blog is the shortened term for web log, an online journal kept by an individual, group or
organization. Blogs are used for a variety of purposes. For example, someone might use a blog
to keep distant relatives informed about family news. Someone else might use a blog to
express political opinions or share news that he or she doesn’t feel is represented well in the
formal media. Organizations can use blogs to share news about recent events or developments
at their organization. A blog can include photos and videos as well as text. The blogger (the
author of the blog) can decide whether or not he or she wants the blog listed publicly on the
blog host’s website and/or found using Internet search engines. Bloggers should assume,
however, that their blogs are not entirely private and that information published in a blog can
be found by persistent web users. There are several free blog hosting services available on the
Internet. Two common ones are Blogger (www.blogger.com) and WordPress
(www.wordpress.com). By going to these websites a computer user can also view public blogs
and become familiar with the broad variety of blogs that can be found on the Internet. For
those involved in education projects, the blog service Class Blogmeister
(http://classblogmeister.com/) has been created to host classroom blogs from around the
world. Teachers can create their own class blogs or browse the site to read blogs from other
classes.
4.3.4. Online Forums
An online forum is a website that is set up to allow users (who usually have to sign up
for free memberships with that website) to communicate amongst themselves on a specific
topic. For example, a forum could be set up for African network technicians to share ideas and
post questions for other members of the group to answer. One forum that might be of interest
to readers of this document is the Telecentre.org forum (www.telecentre.org), that hosts
discussions on a variety of issues related to the development and running of telecentres
(community computer centers).
4.3.5. RSS Feeds
31
A computer user who is interested in keeping track of updates on a variety of blogs,
forums or news websites can find it frustrating or time consuming to visit all of these websites
on a regular basis. RSS (Really Simple Syndication) is a tool that was developed to address this
problem by collecting new information (updates) from websites of interest to a computer user
and putting them all in one location. The collected new information from a web page is called
the “RSS feed” for that webpage and a website where RSS feeds are collected for a particular
user is usually called a reader. There are a variety of free reader services available on the
Internet including the Google reader (www.google.com/reader) and Bloglines
(www.bloglines.com). Once a computer user has set up a reader account, they then need to
subscribe to the websites that they would like to follow on the reader. The reader service
website will provide simple instructions for doing this. For computer users that do not want to
subscribe to a reader service, another option is to download the free RSS Reader program
called RSSOwl (www.rssowl.org).
Some Internet browsers (such as Mozilla Firefox and Internet Explorer) also allow users
to subscribe to RSS feeds and view the contents of these feeds by clicking on the RSS feeds
listed in their Bookmarks (for Mozilla Firefox) or Favorites (for Internet Explorer) menus. If a
website offers an RSS feed, the RSS feed symbol (circled in red on Figure 4, below) will appear
to the right of the URL in the address box. The computer user then can click on this symbol to
subscribe.
Figure 4 -Subscribing to an RSS Feed, Image from Mozilla Firefox Knowledge Database:
http://support.mozilla.com/en-US/kb/Live+Bookmarks?bl=n&s=view%20RSS%20feed&as=q
4.3.6. Social Networking
The term social networking describes a variety of web based services that help
computer users connect with friends and colleagues around the world. Individual users have
different motivations for their social networking that include sharing personal news and
pictures, sharing political information, building business contacts or playing online games.
Many social network sites are free and sustain themselves by providing advertising on their
sites. Some popular social networking sites are described briefly below.
 Facebook. This website allows users to create a profile (containing personal information
of the user’s choice) and share updates (posts) about his or her life and interests with
friends and colleagues that are also Facebook members. There are opportunities on
Facebook to share photos, play games, join interest groups and follow the activities of
various organizations. www.facebook.com.
 My Space. MySpace is similar to Facebook but with a greater emphasis on social
connections and entertainment. www.myspace.com.
32


LinkedIn. This website also involves creating a profile and connecting to friends and
colleagues. LinkedIn has an emphasis on making business connections and can be used
to make new business contacts and share business information. www.linkedin.com.
Twitter. This is the fastest paced of the popular social networking websites. Twitter
allows users to post short messages (known as tweets, with a 140 character maximum)
on any topic of interest. People can then subscribe (known as following) to track the
tweets of as few or as many people as they desire. Some people follow the tweets of
their friends and family members, and other people follow the tweets of businesses,
news reporters and public figures. Relevant tweets often appear on business and
organizational websites, and tweets can also be sent to mobile phones as text (SMS)
messages. www.twitter.com.
One important note of caution: despite the best efforts of social networking websites to
allow users to control who sees their profile, posts and tweets, users cannot assume privacy
when using social networking websites. Users should consider carefully before posting
anything that might affect their jobs or desirability as a future employee. The tip box here
suggests some guidelines. It is particularly important to educate students and other young
adult users of the risks that inappropriate posts can present to them.
Tips for Using Social Networking Privately and Appropriately
1. Don’t assume that any information you put on a social networking website is entirely
private. These websites do have privacy settings that can help you control who sees
which parts of your profile or posts, but these settings don’t always work perfectly and
it is challenging to make sure that you have the settings exactly right.
2. Think carefully when posting or updating your profile. Do you want people to see
pictures of you and your family members? Do you want all of your friends and
colleagues on the social networking site to know who you are dating?
3. Don’t post while angry. Take some time to think first about whether or not your posts
are appropriate or if they will have repercussions for you.
4. Avoid posts that are negative about your current job or employers. It is true that many
of us have times when we are bored or frustrated with our work, but it is important to
be very careful when sharing this information even semi-publicly. Your coworkers or
supervisor might see this information and feel that it reflects badly on the company.
There are many stories in the U.S. of people losing jobs because of Facebook posts that
were critical of their workplace or revealed something negative about themselves as
employees.
5. Avoid posts that could give present or future employers a bad impression of you. For
example, posting about a wild party could seem like harmless fun to you and your
friends, but could give others the impression that you are frivolous or too wild.
Similarly, posting suggestive pictures should always be avoided.
4.4. Web 2.0: Part II – Web 2.0 for Collaborating, Organizing and Teaching
4.4.1. Web 2.0 and E-learning
33
There are a variety of tools that have been developed for use on the Internet that
provide significant assistance to the education process. Some of these are designed for use as a
part of classroom learning and others are designed to facilitate or assist with online (distance)
learning. They are only valuable, however, when the teachers and learners have at least
periodic access to the Internet. What distinguishes these tools from other educational
resources on the Internet is that their purpose is not to provide educational content but to help
teachers, learners and other users to connect with each other, organize a course or provide
their own educational content. Some common web 2.0 tools for e-learning (electronically
assisted learning) are described in the sections below. Some of these tools were already
introduced in Module 3 but are included here for review.
4.4.2. Learning Management Systems
Learning management software (also known as course management software) is a tool
that instructors can use to manage communication with their learners over the internet. It is
used in both face-to-face courses and as a part of online e-learning courses. Some of the tasks
that instructors can do over the Internet using Learning Management Software are the
following:
 Provide a syllabus and learning materials to students
 Suggest Internet learning materials for students
 Give assignments and collect assignments (as electronic documents)
 Take polls of students, and give online quizzes
 Keep track of the progress and performance of students
 Inform students of their progress and performance
 Send and receive messages with students
If both the instructors and the students are reasonably comfortable using computers
and have frequent access to the internet, learning management software can be a great tool for
improving communication between an instructor and a student. Instructors can have
opportunities to “check in” with learners regularly to assess their knowledge, rather than
waiting to see how they perform on a big exam further on in the course. It also can be very
useful for students who have missed a class to find out what they need to do to catch up with
the group.
While using learning management software is fairly simple, setting up a website and a
server to host the software is a more involved process. A lab manager or technician with
significant server and web experience could perform these steps, but many small institutions
will be better off if they contract with an outside organization to set up and host the website
for their learning management system.
One common learning management software program that is freely available and opensource (meaning that it can be adapted to meet local needs) is called Moodle. It is available for
free download from the internet at www.moodle.org. Their web page includes basic
34
information and tutorials on how to use Moodle, and also includes links to commercial
organizations that can host Moodle websites for a reasonable fee.
4.4.3. Online Survey Generators
For educators, students and people working on a variety of projects there are times
when it is valuable to collect the opinions of others involved in a course or project. Here are
some examples: A teacher might want to collect anonymous information on how well learners
think he or she is doing at delivering a course. Students might be assigned to collect opinions
on certain social issues. Community project organizers might want to survey community
members to find out what services they are most interested in or what they might pay for these
services. There are several online survey generators available that are free and easy to use.
These tools allow computer users to create and store their own surveys. Once the survey has
been created, the survey creator then distributes the web address for the survey to individuals
that he or she thinks would be willing to participate in the survey. Participants then go to that
web address and are lead through the process of answering the survey questions. One example
of a free online survey generator is Survey Monkey (www.surveymonkey.com).
4.4.4. Quiz Generators
Online quiz generators are handy tools for teachers to use to make quizzes for their
students to complete online. The websites lead the teachers through the process of creating
customized quizzes, and then the students log in to take the quizzes. The quizzes are then
automatically marked by the website for the teacher to review. Two examples of online quiz
generators are Quiz Center (http://school.discoveryeducation.com/quizcenter/quizcenter.html)
and Classmarker (www.classmarker.com).
4.4.5. Online Document Sharing
An online document storage and sharing system is a convenient way to share and
collaborate on documents. Using Google Docs (available at http://docs.google.com), for
example, anyone with a Gmail account can upload documents (word processing documents,
presentations or spreadsheets) for others to view or (if the person uploading chooses) edit.
This is a very easy way for students engaged in group projects to share information and
collaborate in the writing of reports.
4.4.6. Social Bookmarking
Using an online service to store and organize websites of interest is called social
bookmarking. The Delicious website (http://delicious.com) allows a user to save and organize
bookmarks (including web addresses and key words) for websites of interest on any topic. The
user then can access these bookmarks from any computer connected to the Internet. A teacher
or instructor can also use Delicious to share bookmarks on a specific topic with students.
4.4.7. Wikis
A wiki is a website that is collaboratively created and edited by users. Wikis allow for
the flexible addition of text as users have the time and expertise available to make the
additions. This allows for significantly greater content than if the website was left in the hands
35
of a few designated experts. It also results in a more dynamic experience, with content that
can be changed as the knowledge base changes (for example – as a software application
changes, a wiki user’s guide could also change). One drawback is that if a wiki is available for
the general public to edit, there is a chance that the content will not be entirely correct or
reliable. As a result, some wikis require users to obtain special permission (from the website
owners or assigned experts) before edits can be made. Other wikis have experts that oversee
changes that have been made. Four wikis that are particularly valuable in education are listed
here:
 Qedoc. This wiki is a collection of e-learning resources for learners of all ages. Over
1200 e-learning modules have now been submitted by educators from around the world
(in 11 different languages). Most of these modules are in the form of interactive
quizzes. The web address is www.qedoc.org.
 Wikibooks. This wiki is a large and growing collection of free educational textbooks that
have been created by volunteers and can be edited by users. The topics include a
variety of academic subjects and the texts are written for a variety of age levels. There
is a special Wikijunior section for nonfiction books written for children age 12 and
under. The web address is www.wikibooks.org.
 Wikieducator. This wiki was designed to help educators develop and share educational
content. It houses educational content in a variety of topics that has been developed by
users and can be browsed and edited by registered users. It also hosts educational
projects that are underway and that users can contribute to. These projects are in a
variety of academic subjects but also include projects to improve education and
education access overall. The web address is www.wikieducator.org.
 Wikipedia. This web encyclopedia has a large and ever-growing collection of articles in
over 260 languages. There are over 3 million articles in the English language. It is
particularly valuable for its content related to developing countries, which are
underrepresented in most encyclopedias. The web address is www.wikipedia.org.
4.5. Building a Simple Web Page
Why might a computer lab manager want to build a web page? One possibility is that
he or she might want to advertise a computer project to the wider public. This would be
particularly useful if the computer project was an internet café or any other organization
offering some fee based services to the public. Another possibility is that a computer lab
manager or an instructor might want to use a web page to share learning resources with
students. Or a computer lab manager may be asked by the steering committee or board to
produce a web page for the organization that describes their overall work.
Although producing intricate and highly professional websites requires significant
training in web programming, there are many online services available now to allow users to
create simple and functional websites without any prior training and then host (store on their
servers) these websites for free or a minimal cost. These online services typically allow the
user to start with standard templates (designs) and then add in the text and links they desire.
Two examples of online services that offer easy website creation and free hosting are Google
Sites (www.google.com/sites) and Weebly (www.weebly.com).
36
Users of the free services mentioned above need to consider whether or not they would
like to register a customized domain name (URL or website address) for their website. This can
be handled through the two websites mentioned above, but for a small annual registration fee.
For example, if someone named Simon Zulu owned an internet café he might like to have the
domain name www.zuluicafe.com. This would be easy for people to remember and therefore
find his website on the Internet. However, Simon Zulu would need to register this domain
name and pay a fee to maintain the address. If instead Simon Zulu wanted to have a free
domain name through Google Sites he could have http://sites.google.com/site/zuluicafe or
through Weebly his address could be http://zuluicafe.weebly.com.
For the more adventurous computer lab manager who would like to build websites that
are more customized or complicated than can be done with the above services, the next step is
to learn how to use a web content management system. Like the services mentioned in the
above paragraphs, the user of a web content management system is still not building a website
“from scratch” in the way a web programmer would, but he or she is able to have significant
control over the content of the website in a way that does not require programming
knowledge. Some popular free web content management systems are Drupal (drupal.org),
ImpressCMS (www.impresscms.org), Joomla! (www.joomla.org), WordPress (wordpress.org),
and eXeLearning (www.exelearning.org, for academic use). These web content management
systems do not offer hosting of websites, so the computer lab manager would need to
separately arrange for website hosting (usually requiring an annual fee).
4.6. Assignments/Activities
4.6.1. Send your instructor (or a coworker) an email on any subject you choose. Make sure
that you have an appropriate and informative subject line and have used a spell-checker
on the message itself.
4.6.2. Send your instructor an email with an attachment. As always, make sure the email has
an appropriate subject line. Ask your instructor to reply stating whether or not the
attachment was received.
4.6.3. Learn about the features available with your email service for organizing email
messages. These features could include sorting, tagging or labeling emails, or making
folders to store email messages in. Summarize the tools you found that seem most useful
for you.
4.6.4. Learn more about email scams by asking friends and coworkers to tell you about their
experiences with email scams. What scams have they heard about or experienced
personally? You can also do an Internet search on email hoaxes, scams and/or fraud.
4.6.5. Join an email discussion group (as described in section 4.1.3) and participate in the
discussion
4.6.6. Subscribe to (or download) an RSS reader and set up an RSS feed for a website of
interest to you.
4.6.7. Participate in one of the wiki projects described in section 4.4.7 by adding text to an
existing page or creating a new page. Then check back one week later to see if your
37
contribution is still available on the website and whether or not anyone else has modified
your contribution.
4.6.8. Start a blog (as described in section 4.3.3) or build a free website as described in section
4.5. Report your URL to your instructor.
4.6.9. Investigate some of the free and fee-based web hosting services available. What are the
restrictions on the free sites? How much does fee-based web hosting typically cost?
What benefits are gained by using a fee-based service?
4.6.10. Workshop Activity: Participate in a discussion about email ethics and cross-cultural
issues with email.
4.6.11. Workshop Activity: Participate in a role play about an email scam. A new user has
received an email stating that he or she has won a lottery and the user wants to reply to
claim the prize.
4.6.12. Workshop Activity: As a team, start an email discussion group and practice discussing
topics relevant to the workshop. Also experiment with sharing documents online through
the discussion group (or Google Docs).
4.6.13. Workshop Activity: Share your personal website or blog with a small group. Request
their feedback on your work.
4.6.14. Workshop Activity: Participate in building a class website using a web content
management system.
Table of Contents
5. Overall Assignments/Activities
5.1. Evaluate your own knowledge and skill. What do you need to learn to improve your abilities in
either networking or use of web 2.0 for your organization? Develop a plan to gain these skills.
5.2. Have a discussion with your steering committee or supervisor about your organization’s
network or use of the Internet.
5.2.1. Option 1 – Help them gain an understanding of the importance of web 2.0 as a learning
tool (as opposed to just learning IT skills). Use relevant examples and demonstrations
where possible.
5.2.2. Option 2 – Review your current network infrastructure and ISP contract with the
steering committee or your supervisor. Lead a discussion about what changes (if any)
should be made.
5.2.3. Option 3 – If your project does not currently have an Internet connection, discuss the
costs and benefits of obtaining an Internet connection. If the committee decides to
pursue getting an Internet connection, make sure there is also a plan in place for paying
for the ongoing connectivity costs.
5.3. Workshop Activity: Obtain a copy of the UNESCO Bangkok ICT in Education Teacher Training
Series disk titled “Web Tools for Educators” from your instructor. Browse through the disk and
then participate in a follow up group discussion about what useful resources were found.
5.4. Workshop Activity: Participate in a workshop evaluation process.
Table of Contents
38
6. List of Internet Resources
The table below provides a list of the Internet resources previously mentioned in this
document. The resources are listed in the order they appeared in this module.
Title
Web Monkey
Windows Reference
Firestarter
Untangle
Google Mail
Yahoo
Hot Mail
Google Groups
Yahoo Groups
Web 2.0 for Development Gateway
ICT in Education
Skype
Blogger
WordPress (for blogging)
Class Blogmeister
Telecentre.org
Google Reader
Bloglines
RSSOwl
Facebook
My Space
LinkedIn
Twitter
Moodle
Survey Monkey
Quiz Center
Classmarker
Google Docs
Delicious
Qedoc
Wikibooks
Wikieducator
Wikipedia
Google Sites
Weebly
Web Address (URL)
www.webmonkey.com
www.windowsreference.com
www.fs-security.com
www.untangle.com
www.gmail.com
www.yahoo.com
www.hotmail.com
http://groups.google.com
http://groups.yahoo.com
www.web2fordev.net
www.ictineducation.org
www.skype.com
www.blogger.com
www.wordpress.com
http://classblogmeister.com/
www.telecentre.org
www.google.com/reader
www.bloglines.com
www.rssowl.org
www.facebook.com
www.myspace.com
www.linkedin.com
www.twitter.com
www.moodle.org
www.surveymonkey.com
school.discoveryeducation.com/quizcenter/quizcenter.html
www.classmarker.com
http://docs.google.com
http://delicious.com
www.qedoc.org
www.wikibooks.org
www.wikieducator.org
www.wikipedia.org
www.google.com/sites
www.weebly.com
39
Drupal
ImpressCMS
Joomla!
WordPress (web content mgmt.)
eXeLearning
http://drupal.org
www.impresscms.org
www.joomla.org
http://wordpress.org
www.exelearning.org
Table of Contents
7. Bibliography
2G. (2010). In Wikipedia, The Free Encyclopedia. Retrieved March 23, 2010, from
http://en.wikipedia.org/w/index.php?title=2G&oldid=351283538
Bradley, T. (2010). Introduction to Firewalls. (2010) In About.com: Internet/Network Security .
Retrieved February 17, 2010. http://netsecurity.about.com/od/hackertools/a/aa072004.htm
Brewer, D. (2009). Picture Yourself Networking Your Home or Small Office. Boston: Course Technology.
Camara (2009). Networking Course. Unpublished. For more information contact info@camara.ie
Computer Network. (2010, February 2). In Wikipedia, The Free Encyclopedia. Retrieved February 3,
2010, from http://en.wikipedia.org/w/index.php?title=Computer_network&oldid=341486930
Dionys, D. (2008). How to Make a Network Cable. Unpublished. Produced for the VVOB Program in
Zambia 2008-2013. For more information about VVOB see www.vvob.be.
General Packet Radio Service. (2010, February 2). In Wikipedia, The Free Encyclopedia. Retrieved
February 10, 2010, from
http://en.wikipedia.org/w/index.php?title=General_Packet_Radio_Service&oldid=341574212
High-Speed Downlink Packet Access. (2010). In Wikipedia, The Free Encyclopedia. Retrieved March 23,
2010, from http://en.wikipedia.org/w/index.php?title=HighSpeed_Downlink_Packet_Access&oldid=350191690
Live Bookmarks. (2009). In Mozilla Firefox Support, Knowledge Database. Retrieved March 24, 2010,
from http://support.mozilla.com/en-US/kb/Live+Bookmarks?bl=n&s=view%20RSS%20feed&as=q
Mitchell, B. (2010). Computer and Wireless Networking Basics. Retrieved March 1, 2010, from
About.com:
http://compnetworking.about.com/od/basicneworkingconcepts/u/computer_networking_basics.htm
Mitchell, B. (2010). Introduction to Client Server Networks. Retrieved March 1, 2010, from About.com:
http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-server.htm
40
Mitchell, B. (2010). Wireless Standards. Retrieved March 1, 2010, from About.com:
http://compnetworking.about.com/cs/wireless80211/a/aa80211standard.htm
Network. (n.d.). Dictionary.com Unabridged. Retrieved February 02, 2010, from Dictionary.com
website: http://dictionary.reference.com/browse/network
Network topology. (2010, February 8). In Wikipedia, The Free Encyclopedia. Retrieved February 9,
2010, from http://en.wikipedia.org/w/index.php?title=Network_topology&oldid=342762416
Proxy server. (2010, February 16). In Wikipedia, The Free Encyclopedia. Retrieved February 16, 2010,
from http://en.wikipedia.org/w/index.php?title=Proxy_server&oldid=344406104
Router. (2010, February 8). In Wikipedia, The Free Encyclopedia. Retrieved February 10, 2010, from
http://en.wikipedia.org/w/index.php?title=Router&oldid=342691135
RSS in Plain English. (2007). CommonCraft. Retrieved February 25, 2010.
http://www.commoncraft.com/rss_plain_english
Web 2.0. (2010, February 2). In Wikipedia, The Free Encyclopedia. Retrieved February 3, 2010, from
http://en.wikipedia.org/w/index.php?title=Web_2.0&oldid=341572338
WifiDocs: Wireless Trouble Shooting Guide. (2009, November 25). In Ubuntu Documentation. Retrieved
February 16, 2010 from https://help.ubuntu.com/community/WifiDocs/WirelessTroubleShootingGuide
About Zambia Pacific Trust
There are many challenges for schools and community organizations in Zambia to consider when
starting or maintaining computer projects. Sourcing good quality computers is just the beginning. The
organizations also need to consider infrastructure issues, staff training, computer education curricula,
and internet connectivity. Zambia Pacific Trust (ZPT) helps institutions address these challenges
through advice, training, and a cost-sharing grant process. ZPT currently works with five schools in the
Lusaka area, but has plans to add other organizations in the future. For more information please
contact info@zptrust.org.
About Heidi Neff
Heidi Neff is a former high school science teacher with 15 years of experience in the classroom. While
teaching in Seattle, Washington, she used computers extensively as a part of her curriculum. She also
assisted with computer training in Zambian schools as a part of the Seattle Academy Zambia Program.
Ms. Neff starting working with ZPT in 2006, assisting their efforts to support school computer projects
in Zambia. She is currently a consultant specializing in IT in Education. For more information please
contact her at heidi.h.heff@gmail.com.
41
Download