Skip to content

Application Layer Protocols (HTTP, HTTPS, FTP)Activities & Teaching Strategies

Active learning works for this topic because students need direct experience to grasp how protocols behave in real networks. Watching encrypted versus unencrypted traffic or simulating file transfers helps them move from abstract ideas to concrete understanding.

Year 10Computing4 activities30 min45 min

Learning Objectives

  1. 1Compare the functions of HTTP, HTTPS, and FTP in network communication, identifying their primary use cases.
  2. 2Explain the role of encryption (TLS/SSL) in securing data transmission via HTTPS.
  3. 3Analyze the security risks associated with using HTTP for transmitting sensitive information.
  4. 4Justify the selection of FTP for transferring large files based on its protocol characteristics.

Want a complete lesson plan with these objectives? Generate a Mission

45 min·Pairs

Packet Capture Lab: HTTP vs HTTPS

Use Wireshark to capture traffic from loading an HTTP site, then switch to HTTPS and compare. Students note visible data in HTTP packets versus encrypted HTTPS ones. Discuss security differences in pairs.

Prepare & details

Differentiate between HTTP and HTTPS, explaining the importance of encryption.

Facilitation Tip: During the Packet Capture Lab, set up two identical web requests—one HTTP and one HTTPS—so students can clearly compare the traces side by side.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
30 min·Small Groups

Role-Play: FTP File Transfer

Assign roles as FTP client and server. Client requests files; server authenticates and sends mock data packets. Groups justify FTP commands like PORT and PASV, then debrief on large file efficiency.

Prepare & details

Justify the use of FTP for transferring large files between computers.

Facilitation Tip: For the Role-Play FTP activity, assign clear roles (client, server, observer) and provide a timer to measure transfer speed for large files.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
40 min·Whole Class

Security Breach Simulation: HTTP Risks

Simulate a man-in-the-middle attack on HTTP by intercepting classmate-submitted forms. Switch to HTTPS and show failed interception. Analyze implications for sensitive data in whole-class vote.

Prepare & details

Analyze the security implications of using HTTP instead of HTTPS for sensitive data.

Facilitation Tip: In the Security Breach Simulation, use a shared screen to show real-time interception attempts so students see the immediate consequences of using HTTP on public networks.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
35 min·Individual

Protocol Comparison Chart: Build and Share

Individuals research one protocol, fill comparison charts on ports, security, use cases. Pairs merge charts, present to class. Vote on best protocol for scenarios like website access.

Prepare & details

Differentiate between HTTP and HTTPS, explaining the importance of encryption.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management

Teaching This Topic

Teach this topic by starting with observable behaviors before explaining theory. Use live demonstrations to show how protocols function, then let students replicate the steps themselves. Avoid long lectures on encryption math; focus instead on practical outcomes like speed, security, and reliability. Research shows that hands-on labs and role-play build deeper understanding than abstract explanations.

What to Expect

By the end of these activities, students will confidently differentiate HTTP, HTTPS, and FTP, justify protocol choices with evidence, and identify security risks in plain text transmissions. They will use measured data and peer discussion to support their reasoning.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring the Packet Capture Lab, watch for students who assume HTTP is secure because it is widely used.

What to Teach Instead

During the Packet Capture Lab, have students capture an HTTP login request and immediately point out the visible password in plain text. Guide them to compare this with the encrypted HTTPS trace to show the practical difference in security.

Common MisconceptionDuring the Packet Capture Lab or Security Breach Simulation, students may believe HTTPS is always much slower than HTTP.

What to Teach Instead

During the Packet Capture Lab, have students time both HTTP and HTTPS requests using Wireshark’s IO Graphs. Ask them to compare the timings and discuss why modern hardware makes the overhead negligible.

Common MisconceptionDuring the Role-Play FTP activity, some students may dismiss FTP as outdated because they use cloud storage instead.

What to Teach Instead

During the Role-Play FTP activity, provide real-world examples like automated server backups or large media file transfers where FTP outperforms web-based methods. Ask students to measure transfer times for a 500MB file to justify FTP’s efficiency.

Assessment Ideas

Quick Check

After the Protocol Comparison Chart activity, present students with three scenarios and ask them to identify the most appropriate protocol for each, justifying their choices based on the charts and discussions they created.

Discussion Prompt

During the Security Breach Simulation, facilitate a class discussion by asking students to analyze why HTTPS is crucial for a small business website handling customer data, using evidence from their simulations and prior activities.

Exit Ticket

After the Role-Play FTP activity, ask students to define FTP in their own words and provide one specific reason why it is preferred over HTTP for transferring large files, collecting responses as they leave.

Extensions & Scaffolding

  • Challenge: Ask students to research and present a modern alternative to FTP (e.g., SFTP, SCP) and compare its performance and security to FTP.
  • Scaffolding: Provide a partially completed Wireshark filter list for students who struggle during the Packet Capture Lab to help them isolate HTTP/HTTPS traffic.
  • Deeper exploration: Have students investigate how TLS versions affect HTTPS performance by repeating the Packet Capture Lab with different TLS settings.

Key Vocabulary

HTTP (Hypertext Transfer Protocol)The foundation protocol for data communication on the World Wide Web, used for transferring web pages and related content between clients and servers.
HTTPS (Hypertext Transfer Protocol Secure)An extension of HTTP that encrypts communication using TLS/SSL, ensuring secure data transfer and protecting sensitive information from interception.
FTP (File Transfer Protocol)A standard network protocol used for the transfer of computer files between a client and server on a computer network, particularly useful for large file exchanges.
EncryptionThe process of converting information or data into a code, especially to prevent unauthorized access. In HTTPS, TLS/SSL protocols handle this.

Ready to teach Application Layer Protocols (HTTP, HTTPS, FTP)?

Generate a full mission with everything you need

Generate a Mission