Year 10
Lesson details
Key learning points
- In this lesson, we will look at how we measure network speed and performance, and what some of the key considerations are when designing networks, to ensure that they can function as well as possible. We will also learn about network broadcast traffic and how this affects network performance, and about the use of virtual LANs as a way to control the impact of broadcast traffic. Finally, we will look at the different ways and reasons that criminals attack computer networks, and what methods we have to defend ourselves against these attacks.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
4 Questions
Q1.
Select three advantages of packet switching.
More reliable — dedicated connection
Q2.
What are the four different layers associated with the Internet Protocol?
Acknowledgement, Internet, Layer, Transport
Application, Interface, Link, Topology
Assembled, Interface, Layer, Topology
Q3.
At what layer does network communication using MAC addresses occur?
Application
Internet
Transport
Q4.
What does UDP stand for?
User Data Packet
User Data Process
User Datagram Packet
6 Questions
Q1.
What unit of measurement do we use to indicate network speeds?
Gigabytes per second (gbs)
Miles per hour (mph)
Q2.
What is network latency a measure of?
It is a measure of the amount of data travelling across the network.
It is a measure of the number of files travelling through a network.
Q3.
How many computers on the network receive messages that are broadcast, such as a DHCP broadcast?
1, the one that it is addressed to.
None
Q4.
What does VLAN stand for?
Very Large Area Network
Very Local Area Node
Virtual Local Area Node
Q5.
True or false, VLANs be used to secure one network from another?
False
Q6.
Why do hackers target computer networks
To gain prestige in a hacking community.
To protest.
To steal identity information.
To steal government secrets.
To steal intellectual property.
To steal monetary information.