silabus cisco7

12
KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang SILABUS NAMA SEKOLAH : SMK Telekomunikasi Tunas Harapan MATA PELAJARAN : Wireless Technologies KELAS/SEMESTER : XI / Genap STANDAR KOMPETENSI : Wireless Technologies KODE : CCNAD1-7 ALOKASI WAKTU : 51 X 45 menit KOMPETENSI DASAR MATERI PEMBELAJARAN KEGIATAN PEMBELAJARAN INDIKATOR PENILAIAN ALOKASI WAKTU SUMBER BELAJAR TM PS PI 1. Describ e wireless technologies Electromagnetic radiation and the RF band as the most commonly used wavelengths Infrared for short-range and line-of-sight communications LAN technologies that conform to the various IEEE 802.11 standards Bluetooth technologies Wireless Personal Identify the functions and capabilities along the electromagnetic radiation spectrum. Differentiate applications of infrared wireless technologies from radio frequency (RF) wireless technologies. Communicate the advantages of Bluetooth as a RF technology applied to local device management Compare the advantages of wireless technologies with those of wired technologies. Industrial, Scientific and Medical (ISM) bands enable wireless networking Bluetooth as a technology that provides one to many communications using RF Encryption and authentication as security Tes Tertulis Tes Praktek Tugas 3 5 (10) 4 (16) CCN A Discovery Course Int ernet Sof tware Simulator Jaringan Komputer . PROGRAM KEAHLIAN: SILABUS - Wireless Technologies TEKNIK KOMPUTER DAN JARINGAN Halaman 1 dari 12

Upload: aris3t4354

Post on 27-Oct-2015

8 views

Category:

Documents


0 download

DESCRIPTION

cisco

TRANSCRIPT

Page 1: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

SILABUSNAMA SEKOLAH : SMK Telekomunikasi Tunas HarapanMATA PELAJARAN : Wireless TechnologiesKELAS/SEMESTER : XI / GenapSTANDAR KOMPETENSI : Wireless TechnologiesKODE : CCNAD1-7ALOKASI WAKTU : 51 X 45 menit

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

1. Describe wireless technologies

Electromagnetic radiation and the RF band as the most commonly used wavelengths

Infrared for short-range and line-of-sight communications

LAN technologies that conform to the various IEEE 802.11 standards

Bluetooth technologies Wireless Personal Area

Networks (Pan's), Wide Area Networks (WANs), and Local Area Networks (LANs)

Identify the functions and capabilities along the electromagnetic radiation spectrum.

Differentiate applications of infrared wireless technologies from radio frequency (RF) wireless technologies.

Communicate the advantages of Bluetooth as a RF technology applied to local device management

Compare the advantages of wireless technologies with those of wired technologies.

Differentiate between the attributes of wireless PANs, LANs, and WANs

Industrial, Scientific and Medical (ISM) bands enable wireless networking

Bluetooth as a technology that provides one to many communications using RF

Encryption and authentication as security strategies for wireless networks

Data speed, reliability, and interference associated with wireless networks.

Impact of the environment on the performance of wireless technologies

Understanding

Tes Tertulis Tes Praktek Tugas

3 5(10)

4(16)

CCNA Discovery Course

Internet

Software Simulator Jaringan Komputer

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 1 dari 8

Page 2: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

boundaries with wireless technologies

2. Describe the various com-ponents and structure of a WLAN

The IEEE standards that ensure that wireless devices can communicate.

The various components that must be considered in a WLAN include wireless clients, Access Points, wireless bridges, and antennas.

Service Set Identifier (SSID)

Independent Basic Services Sets (IBBS), Basic Service Sets (BSS), Distribution System, and Extended Service Sets (ESS)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).

Introduce the 802.11 standard for wireless networks (Wi-Fi) and differentiate between 802.11a, 802.11b, 802.11g and 802.11n

Introduce the role of the Wi-Fi Alliance

Demonstrate the use of Access Point devices (AP's) in converting signals between Ethernet and 802.11 technologies

Discuss the use of antennas for extending network accessibility

Explain the role of the SSID in wireless networking and create an SSID on a AP device

Explain the two basic forms of WLAN installations: Ad-hoc mode and infrastructure mode

Demonstrate the use of an IBBS and a BSS

Demonstrate the use of a Distribution System to create an Extended Service Set as a means to expand the coverage area.

Explain the reservation process created with by implementation of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to manage channel access within a BSS.

Demonstrate the setting of a channel on an AP

All components within a WLAN must adhere to the same standard, or at least be compatible with the standard.

Antennas are classified based on the way they output the signal, either directional or omni-directional.

The SSID, a 32-character, case-sensitive, alphanumeric string is used to tell wireless devices which WLAN they belong to and with which other devices they can communicate.

Peer-to-Peer wireless networks work with no AP's and STA set to Ad Hoc mode, while larger networks require an AP with a setting of Infrastructure mode on all devices within the network.

In order to allow movement between the cells without the loss of

Tes Tertulis Tes Praktek Tugas

3 6(12)

4(16)

CCNA Discovery Course

Internet

Software Simulator Jaringan Komputer

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 2 dari 8

Page 3: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

Demonstrate setting up a wireless connection using STA based software at the OS and NIC level

Demonstrate the use of the Ping functionality to test a wireless connection

signal, BSS's must overlap by approximately 10%.

Multiple BSS's make up an ESS via a distribution channel.

Conversations among wireless clients in a BSS or ESS must be controlled by the use of channels that can be set manually or automatically on an AP.

Wireless technology uses CSMA/CA to create a reservation on a channel for use by a specific conversation.

In order for a STA to connect to the WLAN, the AP’s SSID, security settings, and channel information (if manually set) must match that of the client software that manages the client connection.

The wireless client software used can be software integrated into the device operating system, or can be a stand-alone wireless

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 3 dari 8

Page 4: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

utility software designed to interact with the wireless NIC

3. Describe wireless LAN security is-sues and mitiga-tion strategies

SSID as a means of access to a wireless network

MAC Address filtering Authentication Encryption Strategies Traffic Filtering

Explain the security features and implementation methods that help protect WLAN’s from attacks and security breaches

Demonstrate how turning off the SSID broadcast and applying passwords enhances security on a wireless network

Demonstrate filtering using MAC addresses

Differentiate between three type of authentication (open, pre-shared keys, and Extensible Authentication Protocol (EAP)

Demonstrate the application of MAC address filtering, WEP, WPA, and WPA2

Demonstrate the application of Traffic filtering on an AP device.

Vulnerability in wireless networking requires special security features and implementation methods to help protect your WLAN from attacks.

When the SSID function is turned off the presence of a network is no longer made public.

Access to a wireless network can be controlled by filtering MAC addresses.

Authentication is the process of permitting entry to a network based on a set of credentials.

Under open authentication, wireless devices do not require authentication and clients are able to associate regardless of who they are.

Pre-Shared keys (PSK) require that both the AP

Tes Tertulis Tes Praktek Tugas

3 6(12)

4(16)

CCNA Discovery Course

Internet

Software Simulator Jaringan Komputer

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 4 dari 8

Page 5: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

and client be configured with the same key or secret word.

Extensible Authentication Protocol (EAP), a backend server functions separately from the AP and maintains a database of valid users that can access the network.

Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air using pre-configured keys to encrypt and decrypt data.

WPA uses encryption keys from 64 bits up to 256 bits, and generates new, dynamic keys each time a client establishes a connection with the AP.

Traffic filtering blocks undesirable traffic from entering or leaving the wireless network.

4. Configure an inte-grated wireless

Wireless network plan including user

Explain the planning process for designing and implementing a

The planning process for a wireless network

Tes Tertulis Tes Praktek

3 6(12)

4(16)

CCNA Discovery

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 5 dari 8

Page 6: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

access point and a wireless client

requirements, site survey, security requirements, and a security plan

Back-up procedures Firmware updates

wireless network. Demonstrate the process for

gathering network user requirements. Demonstrate the process for

conducting a site survey. Demonstrate the set-up procedures

for an AP. Demonstrate an Integrated Router

back up and restore process. Demonstrate the process for updating

Integrated Router firmware.

includes determining the type of wireless standard to use, the most efficient layout of devices, an installation and security plan and a strategy for backing up and updating the firmware of the wireless devices.

A site survey is needed to determine the optimum number and location of AP's to provide the appropriate coverage at the least amount of cost.

It is necessary to consider known sources of interference such as high-voltage wires, motors and other wireless devices when determining the placement of WLAN equipment.

As new features are developed for the Integrated Router or problems with the existing firmware are discovered, it may

Tugas Course Inter

net Soft

ware Simulator Jaringan Komputer

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 6 dari 8

Page 7: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

KOMPETENSI DASAR

MATERI PEMBELAJARAN

KEGIATAN PEMBELAJARAN INDIKATOR PENILAIANALOKASI WAKTU SUMBER

BELAJARTM PS PI

become necessary to update the firmware on the device.

Keterangan

TM : Tatap MukaPS : Praktek di Sekolah (2 jam praktik di sekolah setara dengan 1 jam tatap muka)PI : Praktek di Industri (4 jam praktik di Du/ Di setara dengan 1 jam tatap muka)

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 7 dari 8

Page 8: SILABUS Cisco7

KURIKULUM SMK Telekomunikasi Tunas Harapan, Kabupaten Semarang

.

PROGRAM KEAHLIAN: SILABUS - Wireless TechnologiesTEKNIK KOMPUTER DAN JARINGAN Halaman 8 dari 8