Lesson details

Key learning points

  1. In this lesson, we will look at how we measure network speed and performance, and what some of the key considerations are when designing networks, to ensure that they can function as well as possible. We will also learn about network broadcast traffic and how this affects network performance, and about the use of virtual LANs as a way to control the impact of broadcast traffic. Finally, we will look at the different ways and reasons that criminals attack computer networks, and what methods we have to defend ourselves against these attacks.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

4 Questions

Q1.
Select three advantages of packet switching.
Correct answer: Bandwidth used efficiently
More reliable — dedicated connection
Correct answer: Packets can be redelivered
Correct answer: Packets can take different routes around congestion
Q2.
What are the four different layers associated with the Internet Protocol?
Acknowledgement, Internet, Layer, Transport
Application, Interface, Link, Topology
Correct answer: Application, Internet, Link, Transport
Assembled, Interface, Layer, Topology
Q3.
At what layer does network communication using MAC addresses occur?
Application
Internet
Correct answer: Link
Transport
Q4.
What does UDP stand for?
User Data Packet
User Data Process
User Datagram Packet
Correct answer: User Datagram Protocol

6 Questions

Q1.
What unit of measurement do we use to indicate network speeds?
Correct answer: Bits per second (bps)
Gigabytes per second (gbs)
Miles per hour (mph)
Q2.
What is network latency a measure of?
It is a measure of the amount of data travelling across the network.
Correct answer: It is a measure of the delay in data travelling across the network. It is measured in milliseconds.
It is a measure of the number of files travelling through a network.
Q3.
How many computers on the network receive messages that are broadcast, such as a DHCP broadcast?
1, the one that it is addressed to.
Correct answer: All of them
None
Q4.
What does VLAN stand for?
Very Large Area Network
Very Local Area Node
Correct answer: Virtual Local Area Network
Virtual Local Area Node
Q5.
True or false, VLANs be used to secure one network from another?
False
Correct answer: True
Q6.
Why do hackers target computer networks
Correct answer: All of the above.
To gain prestige in a hacking community.
To protest.
To steal identity information.
To steal government secrets.
To steal intellectual property.
To steal monetary information.

Lesson appears in

UnitComputing / Networks

Computing