silabus cisco7
Post on 27-Oct-2015
8 Views
Preview:
DESCRIPTION
TRANSCRIPT
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
SILABUSNAMA SEKOLAH : SMK Telekomunikasi Tunas HarapanMATA PELAJARAN : Wireless TechnologiesKELAS/SEMESTER : XI / GenapSTANDAR KOMPETENSI : Wireless TechnologiesKODE : CCNAD1-7ALOKASI WAKTU : 51 X 45 menit
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
1. Describe wireless technologies
Electromagnetic radiation and the RF band as the most commonly used wavelengths
Infrared for short-range and line-of-sight communications
LAN technologies that conform to the various IEEE 802.11 standards
Bluetooth technologies Wireless Personal Area
Networks (Pan's), Wide Area Networks (WANs), and Local Area Networks (LANs)
Identify the functions and capabilities along the electromagnetic radiation spectrum.
Differentiate applications of infrared wireless technologies from radio frequency (RF) wireless technologies.
Communicate the advantages of Bluetooth as a RF technology applied to local device management
Compare the advantages of wireless technologies with those of wired technologies.
Differentiate between the attributes of wireless PANs, LANs, and WANs
Industrial, Scientific and Medical (ISM) bands enable wireless networking
Bluetooth as a technology that provides one to many communications using RF
Encryption and authentication as security strategies for wireless networks
Data speed, reliability, and interference associated with wireless networks.
Impact of the environment on the performance of wireless technologies
Understanding
Tes Tertulis Tes Praktek Tugas
3 5(10)
4(16)
CCNA Discovery Course
Internet
Software Simulator Jaringan Komputer
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 1 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
boundaries with wireless technologies
2. Describe the various com-ponents and structure of a WLAN
The IEEE standards that ensure that wireless devices can communicate.
The various components that must be considered in a WLAN include wireless clients, Access Points, wireless bridges, and antennas.
Service Set Identifier (SSID)
Independent Basic Services Sets (IBBS), Basic Service Sets (BSS), Distribution System, and Extended Service Sets (ESS)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).
Introduce the 802.11 standard for wireless networks (Wi-Fi) and differentiate between 802.11a, 802.11b, 802.11g and 802.11n
Introduce the role of the Wi-Fi Alliance
Demonstrate the use of Access Point devices (AP's) in converting signals between Ethernet and 802.11 technologies
Discuss the use of antennas for extending network accessibility
Explain the role of the SSID in wireless networking and create an SSID on a AP device
Explain the two basic forms of WLAN installations: Ad-hoc mode and infrastructure mode
Demonstrate the use of an IBBS and a BSS
Demonstrate the use of a Distribution System to create an Extended Service Set as a means to expand the coverage area.
Explain the reservation process created with by implementation of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to manage channel access within a BSS.
Demonstrate the setting of a channel on an AP
All components within a WLAN must adhere to the same standard, or at least be compatible with the standard.
Antennas are classified based on the way they output the signal, either directional or omni-directional.
The SSID, a 32-character, case-sensitive, alphanumeric string is used to tell wireless devices which WLAN they belong to and with which other devices they can communicate.
Peer-to-Peer wireless networks work with no AP's and STA set to Ad Hoc mode, while larger networks require an AP with a setting of Infrastructure mode on all devices within the network.
In order to allow movement between the cells without the loss of
Tes Tertulis Tes Praktek Tugas
3 6(12)
4(16)
CCNA Discovery Course
Internet
Software Simulator Jaringan Komputer
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 2 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
Demonstrate setting up a wireless connection using STA based software at the OS and NIC level
Demonstrate the use of the Ping functionality to test a wireless connection
signal, BSS's must overlap by approximately 10%.
Multiple BSS's make up an ESS via a distribution channel.
Conversations among wireless clients in a BSS or ESS must be controlled by the use of channels that can be set manually or automatically on an AP.
Wireless technology uses CSMA/CA to create a reservation on a channel for use by a specific conversation.
In order for a STA to connect to the WLAN, the AP’s SSID, security settings, and channel information (if manually set) must match that of the client software that manages the client connection.
The wireless client software used can be software integrated into the device operating system, or can be a stand-alone wireless
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 3 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
utility software designed to interact with the wireless NIC
3. Describe wireless LAN security is-sues and mitiga-tion strategies
SSID as a means of access to a wireless network
MAC Address filtering Authentication Encryption Strategies Traffic Filtering
Explain the security features and implementation methods that help protect WLAN’s from attacks and security breaches
Demonstrate how turning off the SSID broadcast and applying passwords enhances security on a wireless network
Demonstrate filtering using MAC addresses
Differentiate between three type of authentication (open, pre-shared keys, and Extensible Authentication Protocol (EAP)
Demonstrate the application of MAC address filtering, WEP, WPA, and WPA2
Demonstrate the application of Traffic filtering on an AP device.
Vulnerability in wireless networking requires special security features and implementation methods to help protect your WLAN from attacks.
When the SSID function is turned off the presence of a network is no longer made public.
Access to a wireless network can be controlled by filtering MAC addresses.
Authentication is the process of permitting entry to a network based on a set of credentials.
Under open authentication, wireless devices do not require authentication and clients are able to associate regardless of who they are.
Pre-Shared keys (PSK) require that both the AP
Tes Tertulis Tes Praktek Tugas
3 6(12)
4(16)
CCNA Discovery Course
Internet
Software Simulator Jaringan Komputer
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 4 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
and client be configured with the same key or secret word.
Extensible Authentication Protocol (EAP), a backend server functions separately from the AP and maintains a database of valid users that can access the network.
Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air using pre-configured keys to encrypt and decrypt data.
WPA uses encryption keys from 64 bits up to 256 bits, and generates new, dynamic keys each time a client establishes a connection with the AP.
Traffic filtering blocks undesirable traffic from entering or leaving the wireless network.
4. Configure an inte-grated wireless
Wireless network plan including user
Explain the planning process for designing and implementing a
The planning process for a wireless network
Tes Tertulis Tes Praktek
3 6(12)
4(16)
CCNA Discovery
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 5 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
access point and a wireless client
requirements, site survey, security requirements, and a security plan
Back-up procedures Firmware updates
wireless network. Demonstrate the process for
gathering network user requirements. Demonstrate the process for
conducting a site survey. Demonstrate the set-up procedures
for an AP. Demonstrate an Integrated Router
back up and restore process. Demonstrate the process for updating
Integrated Router firmware.
includes determining the type of wireless standard to use, the most efficient layout of devices, an installation and security plan and a strategy for backing up and updating the firmware of the wireless devices.
A site survey is needed to determine the optimum number and location of AP's to provide the appropriate coverage at the least amount of cost.
It is necessary to consider known sources of interference such as high-voltage wires, motors and other wireless devices when determining the placement of WLAN equipment.
As new features are developed for the Integrated Router or problems with the existing firmware are discovered, it may
Tugas Course Inter
net Soft
ware Simulator Jaringan Komputer
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 6 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
KOMPETENSI DASAR
MATERI PEMBELAJARAN
KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER
BELAJARTM PS PI
become necessary to update the firmware on the device.
Keterangan
TM : Tatap MukaPS : Praktek di Sekolah (2 jam praktik di sekolah setara dengan 1 jam tatap muka)PI : Praktek di Industri (4 jam praktik di Du/ Di setara dengan 1 jam tatap muka)
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 7 dari 8
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang
.
PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 8 dari 8
top related