Skip to content
Computing · Year 10

Active learning ideas

Application Layer Protocols (HTTP, HTTPS, FTP)

Active learning works for this topic because students need direct experience to grasp how protocols behave in real networks. Watching encrypted versus unencrypted traffic or simulating file transfers helps them move from abstract ideas to concrete understanding.

National Curriculum Attainment TargetsGCSE: Computing - Network Protocols and Layers
30–45 minPairs → Whole Class4 activities

Activity 01

Case Study Analysis45 min · Pairs

Packet Capture Lab: HTTP vs HTTPS

Use Wireshark to capture traffic from loading an HTTP site, then switch to HTTPS and compare. Students note visible data in HTTP packets versus encrypted HTTPS ones. Discuss security differences in pairs.

Differentiate between HTTP and HTTPS, explaining the importance of encryption.

Facilitation TipDuring the Packet Capture Lab, set up two identical web requests—one HTTP and one HTTPS—so students can clearly compare the traces side by side.

What to look forPresent students with three scenarios: 1. Logging into a bank account. 2. Downloading a large software update. 3. Browsing a news website. Ask them to identify which protocol (HTTP, HTTPS, or FTP) is most appropriate for each and briefly explain why.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 02

Case Study Analysis30 min · Small Groups

Role-Play: FTP File Transfer

Assign roles as FTP client and server. Client requests files; server authenticates and sends mock data packets. Groups justify FTP commands like PORT and PASV, then debrief on large file efficiency.

Justify the use of FTP for transferring large files between computers.

Facilitation TipFor the Role-Play FTP activity, assign clear roles (client, server, observer) and provide a timer to measure transfer speed for large files.

What to look forFacilitate a class discussion: 'Imagine you are advising a small business owner about their website. What are the key differences between HTTP and HTTPS, and why is using HTTPS crucial for their customer data, especially if they handle personal information or process online payments?'

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 03

Case Study Analysis40 min · Whole Class

Security Breach Simulation: HTTP Risks

Simulate a man-in-the-middle attack on HTTP by intercepting classmate-submitted forms. Switch to HTTPS and show failed interception. Analyze implications for sensitive data in whole-class vote.

Analyze the security implications of using HTTP instead of HTTPS for sensitive data.

Facilitation TipIn the Security Breach Simulation, use a shared screen to show real-time interception attempts so students see the immediate consequences of using HTTP on public networks.

What to look forOn a slip of paper, ask students to define FTP in their own words and provide one specific reason why it is preferred over HTTP for transferring large files. Collect these as they leave.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 04

Case Study Analysis35 min · Individual

Protocol Comparison Chart: Build and Share

Individuals research one protocol, fill comparison charts on ports, security, use cases. Pairs merge charts, present to class. Vote on best protocol for scenarios like website access.

Differentiate between HTTP and HTTPS, explaining the importance of encryption.

What to look forPresent students with three scenarios: 1. Logging into a bank account. 2. Downloading a large software update. 3. Browsing a news website. Ask them to identify which protocol (HTTP, HTTPS, or FTP) is most appropriate for each and briefly explain why.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teach this topic by starting with observable behaviors before explaining theory. Use live demonstrations to show how protocols function, then let students replicate the steps themselves. Avoid long lectures on encryption math; focus instead on practical outcomes like speed, security, and reliability. Research shows that hands-on labs and role-play build deeper understanding than abstract explanations.

By the end of these activities, students will confidently differentiate HTTP, HTTPS, and FTP, justify protocol choices with evidence, and identify security risks in plain text transmissions. They will use measured data and peer discussion to support their reasoning.


Watch Out for These Misconceptions

  • During the Packet Capture Lab, watch for students who assume HTTP is secure because it is widely used.

    During the Packet Capture Lab, have students capture an HTTP login request and immediately point out the visible password in plain text. Guide them to compare this with the encrypted HTTPS trace to show the practical difference in security.

  • During the Packet Capture Lab or Security Breach Simulation, students may believe HTTPS is always much slower than HTTP.

    During the Packet Capture Lab, have students time both HTTP and HTTPS requests using Wireshark’s IO Graphs. Ask them to compare the timings and discuss why modern hardware makes the overhead negligible.

  • During the Role-Play FTP activity, some students may dismiss FTP as outdated because they use cloud storage instead.

    During the Role-Play FTP activity, provide real-world examples like automated server backups or large media file transfers where FTP outperforms web-based methods. Ask students to measure transfer times for a 500MB file to justify FTP’s efficiency.


Methods used in this brief