• Tidak ada hasil yang ditemukan

SEKOLAH MENENGAH KEJURUAN IT NETWORK SYS (1)

N/A
N/A
Protected

Academic year: 2018

Membagikan "SEKOLAH MENENGAH KEJURUAN IT NETWORK SYS (1)"

Copied!
7
0
0

Teks penuh

(1)

LOMBA KOMPETENSI SISWA 2016

SEKOLAH MENENGAH KEJURUAN

TINGKAT KABUPATEN PESAWARAN

BIDANG LOMBA

IT NETWORK SYSTEM

ADMINISTRATIONS

TEKNIK KOMPUTER & JARINGAN

DINAS PENDIDIKAN DAN KEBUDAYAAN

(2)

1

st

D

a y C

o m

p

et

i t i o n

2. Create 2 formatted partitions as follows:

- C:50% of harddisk capacity using NTFS partition - D:50% of harddisk capacity using FAT32 partition 3. Install networkcard, Wireless and VGAdrivers

4. Please configure Laptop clientas follows: - Companyname :LKS2016

1. Setup PC Router with the operating system Linux Debian 6 with kernel version 2.6 or newer. 2.Use DVD(s) as installation source. All software packages needed will be gathered from DVD(s).

Don’t install graphical user interface (GUI) such as KDE, GNOME,etc. 3. PCRouter configuration:

- Host :routerX (x is the competitor’snumber)

- IP Address of external LANcard :192.168.x.w/29 (x is the competitor’s number and w is the valid number)

- Root password :lks2016

4. Configure PC Router to connect PC Server and PC Client.

Part3–PCServer Setup

1. Setup PC Server with the operating system Linux Debian6 with kernel version 2.6 or newer 2. UseDVD(s) which used to setup PCRouter as installation source. All software packages needed

will be gathered from DVD(s). Don’t install graphical user interface (GUI) such as KDE,GNOME,etc.

3. PC Server configuration:

(3)

- IPAddress :192.168.x.y/29 (x is the competitor’s number and y is the valid number).

- Rootpassword :lks2016

Part4–AccessPointSetup

1. Connect the Access Point to Laptop Client

2. Configure theWireless Accesspoint as follows:

- Ipaddress as172.16.X.Y/28 (X is the competitor’s number and Y is the valid number) - WPA-PSK authentication with pre-sharedkey(lksxx00000), xx is the competitor’s number - SSID as AP-X (x is the competitor’s number)

- SSID broadcast “disable”

SECTION2–WORKTASKNETWORK Part5–Cabling

1. Make a crossover cable with +2 meters long then give label “CC-x” near to each connector (x is competitor’s number) according to standard T568B.

2. Make a straighthrough cable with +2 meters long then give label “ST-x” near to each connector (x is competitor’s number) standard T568B.

Part6–Network Installation

(4)

Part 7 – Sharing Data With Samba

1. Share your home directory with samba aplication.

2. in your home directory please make 2 directory. First user permission can’t full access “Private” and second directory can full access “Public”.

3. Add user to access “Private” directory.

Part 8–Filesharing

1. Copyfile“form.txt”from Judge’s computer

2. Fill in information as required in the file “form.txt”

3. Save the file to desktop as “form-x.txt”(x is competitor’s number)

Part 9–Printersharing with Admin & Cups

1. Add printer which connected to the Judge’scomputer 2. Print file “form-x.txt”above.

(5)

SECTION3–SERVERCONFIGURATION

Part 10 – IP Virtual

1. Configure the IP with Virtual IP to use in DNS

2. The prefix IP is 192.168.x.1-5 to dns delegation (master, www, mail, ftp, ntp, cube, etc).

Part 11 – Packet Forwarding

1. This is aplication to routing so, in above can be configure to your router and server setup 2. Please ceck your conection from client to router, server, and PC Admin.

Part 12 – Remote Server and Router use Telnet & SSH

1. Configure telnet or ssh with port 22 to remote your server or router

Part13–ConfigureDNSServer (index.html has to be a valid html file).

2. Configure HTTPS to access your domain https://lksx.sch.id

Part 15–Configure Mail Server

1. User scan access email via the web. Mail server which we will discuss here is to use postfix and dovecot.

2. For webmail,we use SquirrelMail.

3. Domain is h tt p : / /m ail . lks x. sc h . i d / (x is the competitor’s number)

Part 17–Configure NTP Server

1. NTP runs on UDP protocol, which is light weight and unreliable NTPServer

2. NTPserver, located in the ntp.conf file.

(6)

1. Install and configure webmin use https://lksx.sch.id:10000

Part19–ConfigureProxyServer

1. Configure Proxy Server to block the websites listed below. Use the ACL(access control list) to achieve this.

- w w w . d e bi a n . o r g -w w w . g oo g l e . c o m

- w w w .facebook.com , etc.

2. Configure Squid to network in transparent mode using IPTABLES. Use NAT to configure NIC client to use the proxy. All network clients will use the proxy automatic.

SECTION4–ROUTER CONFIGURATION

Part 20 – Packet Forwarding

1. This is aplication to routing so, in above can be configure to your router and server setup 2. Please ceck your conection from client to router, server, and PC Admin.

Part 21 – Remote Server and Router use Telnet & SSH

1. Configure telnet or ssh with port 22 to remote your server or router

Part22–Configure DHCPServer

1. Fill IPAddress of DHCPServer with valid available IPaddress.

2. Change external LANcard IPAddress of PCRouter to DHCP, After you configure the DHCPServer, setback IPAddress of external LANcard of PCRouter according to figure1.

TIME WORK DESCRIPTION PRIORITY

Section Time Priority to work the task

SECTION TIME DETAIL

Installasion PC & AP 30 Minute All install one time

Cabling 10 Minute 2 Stright 1 Cross

Network Sharing 10 Minute Sharing & Field the form

Server Configuration 40 Minute All Configure in Server

Router Configuration 10 Minute All Configure in Router

Maters Added 20 Minute Install & Configure

(7)

Referensi

Dokumen terkait

First, taking time to serve gets you outside of your own life, your own cares, and your own needs and forces you to focus on the needs and cares of others.. Most of the people in

Do you want to leave your home country because of taxes, limited work opportunities, or do you just have a desire to live a different life.. Do you want to find better options for

Once you narrow the field of activities that you really love and after you have taken time to borrow or rent the outdoor gear you can begin to purchase what you like!. It is

Although you may find it takes a bit of time to learn your way around your hosting control panel or the control panel for your domain name registration, you are risking your

And you´ll love it because it increases the amount of money you can potentially borrow, it lowers the interest rate you´ll have to pay, and it lengthens the amount of time

Kajian yang dibuat oleh Innabi dan El Sheikh (2006) yang bertajuk “The change in Mathematics Teacher’s Perceptions of Critical Thinking After 15 Years of

After reading this book, you will have the tools and conceptual background to build any event-driven client or server application you need, not just for the protocols that are a part

(d) the supervising teacher less than the maximum in solving problems of students because the time available is limited... ﺺﺨﻠﻣ ﻲﺗﻮﺘﺳا ، ) ٢٠١٤ (