MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
1.4 Network Devices Explained

1.4 Network Devices Explained

1. Routers

Routers are essential network devices that connect multiple networks together and route data packets between them. They use routing tables to determine the best path for data to travel from the source to the destination. Routers operate at the Network layer (Layer 3) of the OSI model.

Example: Imagine a router as a traffic controller at a busy intersection. It directs traffic (data packets) to the correct destination based on the best route, ensuring efficient and smooth flow.

2. Switches

Switches are network devices that connect multiple devices within a single network. They use MAC addresses to forward data packets to the correct destination within the network. Switches operate at the Data Link layer (Layer 2) of the OSI model.

Example: Think of a switch as a multi-port bridge that connects different devices in a local area network (LAN). It ensures that data is sent only to the intended recipient, reducing unnecessary traffic.

3. Access Points

Access Points (APs) are devices that allow wireless devices to connect to a wired network. They broadcast a wireless signal that devices can connect to, extending the reach of the network. Access Points operate at the Physical layer (Layer 1) and Data Link layer (Layer 2) of the OSI model.

Example: Consider an access point as a lighthouse that guides ships (wireless devices) to a safe harbor (wired network). It provides a reliable connection point for wireless devices to access the network.

4. Firewalls

Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls operate at the Network layer (Layer 3) and Transport layer (Layer 4) of the OSI model.

Example: Picture a firewall as a security guard at the entrance of a building. It checks each person (data packet) against a list of authorized visitors (security rules) before allowing them to enter, ensuring that only safe and legitimate traffic passes through.