MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
Basic Networking Concepts

Basic Networking Concepts

1. IP Addressing

An IP address is a unique identifier assigned to each device connected to a network. It allows devices to communicate with each other over the internet or a local network. IP addresses can be either IPv4 (e.g., 192.168.1.1) or IPv6 (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Example: Think of an IP address like a house address. Just as a letter needs a specific address to reach its destination, data packets need an IP address to reach the correct device on a network.

2. Subnetting

Subnetting is the process of dividing a network into smaller, more manageable subnetworks. This helps in reducing network congestion and improving security. Subnetting involves dividing the IP address into a network portion and a host portion using a subnet mask.

Example: Imagine a large office building with many departments. Subnetting is like dividing the building into smaller sections, each with its own set of rooms (IP addresses). This makes it easier to manage and secure each section independently.

3. MAC Address

A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet.

Example: Think of a MAC address as a serial number on a device. Just as a serial number uniquely identifies a product, a MAC address uniquely identifies a network interface card (NIC).

4. Network Topology

Network topology refers to the arrangement of various elements (links, nodes, etc.) in a computer network. Common topologies include bus, star, ring, and mesh. Each topology has its own advantages and disadvantages in terms of cost, ease of installation and maintenance, and fault tolerance.

Example: A star topology is like a hub-and-spoke system where all devices connect to a central hub. If one device fails, it does not affect the others, but if the central hub fails, the entire network is affected.

5. Routing

Routing is the process of selecting paths in a network along which to send network traffic. Routers are devices that forward data packets between computer networks. They use routing tables to determine the best path for data to travel.

Example: Consider a router as a traffic controller at a busy intersection. It directs data packets (cars) to their destinations (roads) based on the best available route, ensuring efficient and timely delivery.