SAP jaringan komputer lanjutt

SYLLABUS FORM
ISO 9001 : 2008

1.
2.
3.
4.
5.
6.
7.
8.

Doc. No

:

FRM/KUL/01/02

Revision No

:


4

Date of Issue

:

October 01st , 2011

ISO

:

7.5.1 & 7

Created by

Checked by

Approved by


Irwansyah, M.M., M.Kom.

Syahril Rizal, S.T., M.M.,
M.Kom.

M.Izman Herdiansyah, PhD

Valid date

Faculty
: Computer Science
Program Study
: Information Technology
Programm
: S1 Degree
Subject
: Advanced Computer Networking
Subject Code
:

Pra requirement Subject
:
Subject Status
:
Description
: The Bachelor of Information and Communication Technology (Network Design and Security) program has
been designed to meet the growing
industry demand (identified by government) for security specialists who are competent in and
knowledgeable about computer security and network
technologies. Students will undertake a Professional Major in Network Design and Security and an
Advanced Minor in IT Security. While the program
has a strong industry focus with units that prepare students for professional certification (CCNA & MCSE),
students are encouraged to study widely in

a broad range of disciplines.
9. Competencies
:
10. Weekly Learning Process Implementation :
No
1


Topic/ Learning Materials
Introduction
UNDERSTANDING LANs

-

2

Introduction
UNDERSTANDING LANs (cont.)

3

UNDERSTANDING WANs

4

UNDERSTANDING WANs (cont)


-

5

PRACTISE

6

VPNs, INTRANETS, AND
EXTRANETS

-

Sub Topic
LAN Connectivity Options for Small Businesses
Integrating Voice and LAN Infrastructure and
Applications
High-Speed Token Ring
Should You Migrate Your Token Ring Network
to Ethernet?

Introduction to 100Base-T: Fast (and Faster)
Ethernet
Gigabit Ethernet
ATM LAN Emulation
InterLAN Switching
LAN-to-Mainframe Connectivity Choices
Building Highly Reliable Computer Networks
U.S. Telecommunications Today
The Voice Network: Still the Bedrock of the
Wide Area Network
T1, T3, and Sonet Networks
Remote Access Concepts and Techniques
ATM Access: The Genesis of a New Network
Transport over Frame Relay: Issues and
Considerations
Emerging High-Bandwidth Networks
Voice and Data Network Integration
ATM Circuit Emulation Services
Routing and Routing Protocols
Convergence of IP, ATM, and SONET/SDH at

the Backbone
exercise

Reference
Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Virtual Networking Management and Planning
Putting VPNs to Work for Small Businesses and
Offices

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach
Gilbert Held, 2000,Network Design

Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Information

-

7

TRAFFIC ANALYSIS AND
PERFORMANCE (Cont)

-

8


TRAFFIC ANALYSIS AND
PERFORMANCE (Cont)

-

9
10

MID test
MIGRATION CONSIDERATIONS

-

11

12
13

NETWORKING TOOLS AND
TECHNIQUES

PRACTISE
SECURITY

-

Virtual Private Networks: Secure Remote Access
over the Internet
IPSec VPNs
Integrating Data Centers with Intranets
Implementing and Supporting Extranets
Enterprise Network Monitoring and Analysis
in a Mission-Critical Environment
Web Traffic Analysis: Analyzing What Is
Happening on Your Site
Network Architectures and Performance
Performance Engineering in Client/Server
Environments
Understanding Gigabit Ethernet Performance
LAN/WAN Interconnection Requirements and
Implementation Considerations

Demystifying Network Performance
Planning, Designing, and Optimization Planning,
Designing, and Optimization
Proactive Performance Management
Exam
Moving the IT Workforce to a Client/Server
Environment
Selecting and Deploying E-Mail Migration Tools
and Utilities
Gracefully Transitioning from SNA to IP:
Why, How, and When?
Transporting Legacy SNA Traffic over
Frame Relay
SNA over Frame Relay
Planning a Cutover to a New Voice System
A Simulation Method for the Design of
Multimedia Networks
Determining Remote Bridge and Router Delays
Network Baselining as a Planning Tool
Excercise
Working with Cisco Access Lists
Securing Your Router
Protecting a Network from Spoofing and Denial

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

14

SECURITY (cont)

15

CONSIDERING EVOLVING
TECHNOLOGIES

16

FINAL TEST

11. Evaluation

:

12. Reference

:

1.

of Service Attacks
Internet Security: Securing the Perimeter
Remote Access Authentication
An Overview of Cryptographic Methods
Public Key Infrastructure: Using the Internet as a
Virtual Private Network
- Making Your Web Site Hacker Safe: Internet
Security
- Applets and Network Security: A Management
Overview
- Security Management
- Trends in Data Communications Services
- The Emerging Advantage of xDSL Technology
- Preparing for Cable Modems
- Voice and Video on the LAN
- Internet Voice Applications
- Building an IP PBX Telephony Network
- Fax over IP
- Videoconferencing over IP Networks
EXAM
-

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

Gilbert Held, 2000,Network Design
Principles and Applications, USA,
Aurebach

James D. McCabe, 2007,Network Analysis,Architecture, and Design, USA,Elsevier Inc.