Module Overview

WAN Technologies

The focus of this module is on the WAN technologies and network services required by converged applications in a complex network. In this module, learners will understand the selection criteria of network devices and WAN technologies to meet network requirements.

Module Code

COMP H2032

ECTS Credits


*Curricular information is subject to change

Hierarchical Network Design

This chapter introduces network design concepts, principles, models, and architectures. It covers the benefits that are obtained by using a systematic design approach. Emerging technology trends that will affect network evolution are also discussed.

Connecting to the WAN

This chapter introduces WAN standards, technologies, and purposes. It covers selecting the appropriate WAN technologies, services, and devices to meet the changing business requirements of an evolving enterprise.

Point-to-Point Connections

This chapter covers the terms, technology, and protocols used in serial connections. The HDLC and Point-to-Point Protocols (PPP) are introduced. PPP is a protocol that is able to handle authentication, compression, error detection, monitor link quality, and logically bundles multiple serial connections together to share the load.

Frame Relay

This chapter introduces the fundamental concepts of Frame Relay. It also covers Frame Relay configuration, verification, and troubleshooting tasks.

Network Address Translation for IPv4

The chapter discusses how NAT, combined with the use of private address space, is used to both conserve and more efficiently use IPv4 addresses to provide networks of all sizes access to the Internet.

Broadband Solutions

This chapter covers commonly used broadband solutions, such as cable, DSL, and wireless. VPN technology provides security options for data running over these connections.

Securing Site-to-Site Connectivity

This chapter explains the concepts and processes related to VPNs, as well as the benefits of VPN implementations and the underlying protocols required to configure VPNs.

Monitoring the Network

This chapter covers three protocols that a network administrator can use to monitor the network. Syslog, SNMP, and NetFlow are popular protocols with different strengths and weaknesses

Troubleshooting the Network

This chapter describes the network documentation that should be maintained and general troubleshooting procedures, methods, and tools. Typical symptoms and causes at several layers of the OSI model are also discussed.

Module Content & Assessment
Assessment Breakdown %
Other Assessment(s)100