Lessons (6)
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
In this lesson, we will be introduced to computer networks and will learn about the different pieces of computer hardware involved in creating computer networks. We will then identify some of the advantages and disadvantages of using computer networks in the modern world.
1 Slide deck
1 Worksheet
1 Quiz
1 Video
In this lesson, we will be introduced to the ways that computers can be connected together in a network that is either wired or wireless. We will be introduced to MAC addresses and relate this to the need for having unique identifiers for every device on a network.
1 Slide deck
1 Worksheet
2 Quizzes
1 Video
In this lesson, we will further develop our understanding of networks. We will look at the three main types of networks, LAN, WAN, and PAN, and at the different topologies that these networks can use in their design.We will carry out an activity in which we will plan a business network to meet the requirements of a fictional company, Fabgadget Inc.
1 Slide deck
1 Worksheet
2 Quizzes
1 Video
In this lesson, we will compare peer-to-peer networks with client-server networks. We will also build and configure three networks using Packet Tracer.
1 Slide deck
1 Worksheet
2 Quizzes
1 Video
In this lesson, we will get to know application protocols and the TCP/IP model. Finally, we will understand how data travels through a network.
1 Slide deck
1 Worksheet
2 Quizzes
1 Video
In this lesson, we will look at how we measure network speed and performance, and what some of the key considerations are when designing networks, to ensure that they can function as well as possible. We will also learn about network broadcast traffic and how this affects network performance, and about the use of virtual LANs as a way to control the impact of broadcast traffic. Finally, we will look at the different ways and reasons that criminals attack computer networks, and what methods we have to defend ourselves against these attacks.
1 Slide deck
1 Worksheet
2 Quizzes
1 Video