MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
8.1 Introduction to QoS Explained

8.1 Introduction to QoS Explained

Key Concepts of QoS

Quality of Service (QoS) is a set of techniques and mechanisms used to manage network traffic and ensure the reliable delivery of content. Key concepts include:

Classification

Classification involves identifying and categorizing different types of network traffic. This is typically done based on criteria such as source and destination IP addresses, port numbers, and protocol types. Classification helps in prioritizing critical traffic over less important traffic.

Example: In a corporate network, VoIP traffic can be classified as high-priority, while file transfers can be classified as low-priority. This ensures that voice calls are not interrupted by large file transfers.

Marking

Marking involves tagging packets with a priority level to indicate their importance. This is often done using Differentiated Services Code Point (DSCP) values or 802.1p tags. Marking helps network devices to prioritize packets based on their tags.

Example: When a VoIP packet is marked with a high DSCP value, routers and switches in the network will prioritize this packet over other packets with lower DSCP values, ensuring better voice quality.

Policing and Shaping

Policing and shaping are techniques used to control the rate at which traffic is sent or received. Policing drops or marks down packets that exceed a specified rate, while shaping queues packets to be sent at a controlled rate. These techniques help in managing bandwidth and preventing congestion.

Example: In a home network, traffic from a video streaming service can be shaped to ensure that it does not consume all the bandwidth, leaving enough for other applications like web browsing and gaming.

Queuing

Queuing involves managing the order in which packets are processed and transmitted. Different queuing algorithms, such as FIFO (First In, First Out), PQ (Priority Queuing), and WRR (Weighted Round Robin), can be used to prioritize certain types of traffic.

Example: In a network with critical and non-critical traffic, Priority Queuing can be used to ensure that critical traffic (e.g., VoIP) is always processed before non-critical traffic (e.g., email), improving overall network performance.

Congestion Management

Congestion management techniques are used to handle network congestion, which occurs when the demand for network resources exceeds the available capacity. Techniques such as Random Early Detection (RED) and Weighted RED (WRED) can be used to drop packets proactively and prevent congestion.

Example: In a busy data center, WRED can be configured to drop less important packets (e.g., background downloads) before the network becomes congested, ensuring that critical applications continue to function smoothly.