MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
1.4 Network Devices Explained

1.4 Network Devices Explained

1. Routers

Routers are essential network devices that connect different networks together, allowing data to be transmitted between them. They operate at the network layer (Layer 3) of the OSI model and use IP addresses to route packets to their destination. Routers are crucial for internet connectivity, enabling multiple devices to share a single internet connection.

For example, a home router connects your local network (LAN) to the internet (WAN). It assigns IP addresses to devices on your LAN and directs traffic to the correct destination, whether it's within your home or outside on the internet.

2. Switches

Switches are network devices that operate at the data link layer (Layer 2) of the OSI model. They connect devices within a single network, such as a LAN, and use MAC addresses to forward data to the correct destination. Switches are more efficient than hubs because they only send data to the specific port where the destination device is connected, reducing unnecessary traffic.

Imagine a switch as a multi-port bridge that connects multiple devices in a network. For instance, in an office setting, a switch can connect computers, printers, and servers, allowing them to communicate efficiently without broadcasting data to all devices.

3. Access Points

Access Points (APs) are devices that allow wireless devices to connect to a wired network. They operate at the physical layer (Layer 1) and the data link layer (Layer 2) of the OSI model. APs broadcast a wireless signal that devices can connect to, extending the reach of a wired network.

Think of an access point as a wireless bridge that connects your Wi-Fi devices to your wired network. For example, in a large building, multiple access points can be used to provide wireless coverage throughout the entire space, ensuring that all devices can connect to the network.

4. Firewalls

Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They operate at the network layer (Layer 3) and the transport layer (Layer 4) of the OSI model. Firewalls are essential for protecting networks from unauthorized access and cyber threats.

Consider a firewall as a security guard for your network. It checks every packet of data that enters or leaves the network and decides whether to allow or block it based on the rules set by the network administrator. For instance, a firewall can block all incoming traffic from a specific IP address, preventing potential attacks.