MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
Basic Networking Concepts

Basic Networking Concepts

1. IP Addressing

An IP address is a unique identifier assigned to each device connected to a network. It allows devices to communicate with each other over the internet or a local network. IP addresses can be either IPv4 (e.g., 192.168.1.1) or IPv6 (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Example: If you have a home network with a router, the router's IP address might be 192.168.1.1. Each device connected to the router, such as your laptop or smartphone, will have a unique IP address within the range 192.168.1.x.

2. Subnetting

Subnetting is the process of dividing a network into smaller, more manageable subnetworks. This helps in reducing network congestion and improving security. Subnetting is achieved by using a subnet mask, which defines the network and host portions of an IP address.

Example: A network with the IP address 192.168.1.0 and subnet mask 255.255.255.0 can be divided into two subnets by using a subnet mask of 255.255.255.128. This creates two subnets: 192.168.1.0/25 and 192.168.1.128/25.

3. MAC Address

A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi.

Example: If you look at the network settings of your computer, you might see a MAC address like 00:1A:2B:3C:4D:5E. This address is unique to your network card and is used for communication within the local network.

4. Network Topology

Network topology refers to the arrangement of various elements (links, nodes, etc.) in a computer network. Common topologies include bus, star, ring, and mesh. The choice of topology depends on factors like cost, ease of installation, and scalability.

Example: In a star topology, all devices are connected to a central hub or switch. If one device fails, it does not affect the others, but the central hub is a single point of failure.

5. Routing

Routing is the process of selecting paths in a network along which to send network traffic. Routers are devices that forward data packets between computer networks. They use routing tables to determine the best path for data to travel.

Example: When you send an email from your computer to someone on a different network, the data packets travel through multiple routers. Each router checks its routing table to decide the next hop towards the destination.