Question 1

a) Identify and describe the components of a WAN.
b) Explain the purpose of WAN.
Question 2
c) Identify and compare WAN configurations.
d) Compare the following WAN protocols:
TCP/IP
SNA
Question 3
Identify and compare any 2 WAN protocols.
Question 4
a) Explain the tasks involved in WAN performance monitoring.
b) Identify and describe factors that affect WAN response times.
Question 5
Outline the types of WAN network interconnections.
Question 6
Identify and describe ways of securing WAN network in the context of an organisation

Question 1

a) Components of a WAN include routers, switches, modems, and communication links such as leased lines, fiber optics, and satellite connections. These components work together to enable data transfer over large geographical distances.
b) The purpose of WAN is to connect multiple LANs or other networks over a large geographical area, allowing users to access resources and communicate with each other regardless of their physical location.

Question 2
c) WAN configurations can include point-to-point connections, multipoint connections, and virtual private networks (VPNs). Each configuration has its own advantages and use cases.
d) TCP/IP is a widely used WAN protocol that allows for reliable data transmission over the internet. SNA (Systems Network Architecture) is an older IBM protocol that was commonly used for connecting mainframe computers.

Question 3
Two popular WAN protocols for comparison could be MPLS (Multiprotocol Label Switching) and Frame Relay. MPLS is more commonly used today due to its flexibility and scalability, while Frame Relay is a legacy protocol that is being phased out.

Question 4
a) Tasks involved in WAN performance monitoring include measuring network latency, throughput, packet loss, and availability. Network administrators use monitoring tools to track performance and troubleshoot issues.
b) Factors that affect WAN response times include network bandwidth, congestion, latency, distance between nodes, and the efficiency of the WAN protocol being used.

Question 5
Types of WAN network interconnections include dedicated leased lines, MPLS networks, point-to-point connections, and VPNs. Each type of interconnection offers different levels of security, speed, and cost.

Question 6
Securing a WAN network in an organization involves implementing measures such as encryption, firewalls, intrusion detection and prevention systems, access control, and VPNs. Regular security audits and updates are also important to ensure the network is protected from potential threats.