Anda di halaman 1dari 6

BAB 15 JARINGAN LANJUTAN

15.1 TUJUAN
15.1.1 Identifikasi potensi bahaya keamanan dan menerapkan prosedur
keselamatan yang tepat berhubungan dengan jaringan
15.1.2 Desain jaringan berdasarkan kebutuhan pelanggan
15.1.3 Tentukan komponen untuk jaringan pelanggan Anda
15.1.4 Menerapkan jaringan pelanggan
15.1.5 Upgrade jaringan pelanggan
15.1.6 Menjelaskan instalasi, konfigurasi dan manajemen dari sebuah
mail server sederhana
15.1.7 Menjelaskan prosedur perawatan pencegahan untuk jaringan
15.1.8 Mengatasi masalah jaringan

15.2 ISTILAH PENTING


15.2.1 Address Resolution Protocol (ARP)
Digunakan untuk mendapatkan alamat hardware (MAC alamat)
semesta alam terletak pada jaringan fisik yang sama.
15.2.2 Internet Control Message Protocol (ICMP)
Mengirim pesan dan kesalahan laporan mengenai pengiriman
paket
15.2.3 Internet Group Management Protocol (IGMP)
Digunakan oleh IP host untuk melaporkan keanggotaan host grup
untuk router multicast lokal
15.2.4 Internet Protocol (IP)
Sebuah protokol connectionless terutama bertanggung jawab
untuk pengalamatan dan routing paket antara host
15.2.5 Transmission Control Protocol (TCP)
Menyediakan connection-oriented, komunikasi dapat diandalkan
untuk aplikasi yang membutuhkan transfer jumlah data yang
besar pada suatu waktu atau membutuhkan sebuah
pemberitahuan untuk data diterima.
15.2.6 User Datagram Protocol (UDP)
Menunjukkan komunikasi yang lamban dan tidak menjamin
bahwa paket akan terkirim. Aplikasi yang menggunakan ini
biasanya mentransfer sejumlah kecil data sebagai satu paket
15.2.7 Domain Name System (DNS)
Mendefinisikan struktur nama Internet dan mereka asosiasi
dengan alamat IP
15.2.8 Dynamic Host Configuration Protocol (DHCP)
Secara otomatis digunakan untuk menetapkan TCP / IP dan
alamat lainnya yang terkait informasi kepada pelanggan
15.2.9 File Transfer Protocol (FTP)
Memungkinkan pengguna untuk mentransfer file antara lokal dan
remote host komputer.
15.2.10 Hypertext Transfer Protocol (HTTP)
Dasar untuk pertukaran lebih dari halaman World Wide Web
(WWW)
15.2.11 Post Office Protocol (POP)
A simple interface between a user’s mail client software and e-
mail user, used to download mail from the server to the client; it
allows users to manage their mailboxes
15.2.12 Simple Mail Transfer Protocol (SMTP)
Protokol standar untuk pertukaran surat elektronik melalui
Internet
15.2.13 Telecommunication Network (Telnet)
Sebuah protokol virtual terminal (emulasi terminal) yang
memungkinkan user untuk log on ke host yang lain TCP / IP
untuk mengakses sumber daya jaringan
15.2.14 Server Message Block (SMB)
Allows users to share a file or printer.

15.3 CHAPTER OUTLINE


15.3.1 Worksheet: Protocols
15.3.2 Worksheet: ISP Connections
15.3.3 Activity: Network Devices
15.3.4 Lab: Browser Configuration
15.3.5 Lab: Network Resource Sharing
15.3.6 Lab: Wireless NIC Installation
15.3.7 Lab: Wireless Router Installation
15.3.8 Lab: Wireless NIC Connection Test
15.3.9 Lab: Network Problem
15.3.10 Lab: Remote Tech Network Problem

15.4 RINGKASAN

15.5 PERTANYAAN
1. Which protocol provides name resolution for host and domain names
for a TCP/IP network?
A. HTTP
B. SNMP
C. DNS
D. Telnet
2. What protocol do you use to remotely connect to a TCP/IP host to
execute commands at a command prompt?
A. HTTP
B. SNMP
C. Telnet
D. SNMP
3. What protocol in a TCP/IP network is used to send e-mail to another e-
mail server?
A. POP3
B. SMTP
C. SNMP
D. IMAP
4. Which protocol is used to display web pages?
A. HTTP
B. SNMP
C. SMPT
D. Telnet
5. Which protocol is used to identify hosts using IP addresses?
A. TCP
B. SMTP
C. IP
D. DNS
6. What protocol allows you to share a folder or printer in Windows and
other operating systems?
A. ICMP
B. TCP
C. SMB
D. RIP
7. What physical address that is assigned to a network interface is used to
identify a PC with a 48-bit address?
A. IPv4 address
B. MAC address
C. Host address
D. Network address
8. What protocol is used to translate the IP address to the MAC address?
A. ICMP
B. IP
C. TCP
D. ARP
9. What is the default subnet mask of the IP address 199.160.3.250?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
10. How many bits does an IPv4 address consist of?
A. 24 bits
B. 32 bits
C. 48 bits
D. 64 bits
11. Which address is referred to as loopback?
A. 192.168.1.1
B. 169.254.1.1
C. 255.255.255.0
D. 127.0.0.1
12. What feature simplifies the sharing of a folder that makes it available
for everyone?
A. ICMP
B. Simple File Sharing
C. NetBIOS
D. Network Browser Service
13. What protocol assigns IP addresses as a host comes online and may
give different addresses as the host goes online each time?
A. DHCP
B. Static
C. DNS
D. WINS
14. What tool is used to attach a RJ-45 connector to a UTP cable?
A. UTP wire crimper
B. Punch down tool
C. Wire attachment kit
D. DMM
15. What tool can you use to check for a break in a wire or cable?
A. Punch down tool
B. Optical tester
C. Flashback analyzer
D. Multimeter
16. What OSI layer does the IP address belong to?
A. Physical
B. Data link
C. Network
D. Transport
17. How fast is Fast Ethernet?
A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
18. How fast is the 802.11g wireless solution?
A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 280 Mbps
19. You have a network card with an amber lighting continually flashing.
What does the continually flashing amber light indicate?
A. Data is being received by the computer.
B. Transmission collisions are occurring.
C. There is no network connection.
D. The computer is communicating at 10 Mbps
20. What should you first check if a computer cannot connect to the
network?
A. Check for a link light on the network adapter.
B. Check the TCP/IP settings on the computer.
C. Verify that the network cable is good.
D. Make sure that the switch is turned on and the PC is connected to
the switch.

15.6 JAWABAN
1. C 6. C 11. D 16. C
2. C 7. B 12. B 17. B
3. B 8. D 13. A 18. C
4. A 9. C 14. A 19. B
5. C 10. B 15. D 20. A

Anda mungkin juga menyukai