MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
8.3 Traffic Shaping and Policing Explained

8.3 Traffic Shaping and Policing Explained

Key Concepts

Traffic Shaping and Policing are techniques used to manage and control network traffic to ensure efficient and fair use of bandwidth. Key concepts include:

Traffic Shaping

Traffic Shaping is a technique used to smooth out traffic flow by delaying packets to meet a specified rate. This ensures that traffic does not exceed the agreed-upon rate, preventing congestion and ensuring fair use of bandwidth.

Example: In a corporate network, a department might have a guaranteed bandwidth of 10 Mbps. Traffic Shaping ensures that even if the department's traffic spikes, it does not exceed this 10 Mbps limit, preventing congestion for other departments.

Policing

Policing is a technique used to enforce a traffic rate by dropping packets that exceed a specified limit. Unlike Traffic Shaping, which delays packets, Policing immediately drops excess packets, ensuring that the traffic rate remains within the agreed-upon limits.

Example: In a service provider network, a customer might have a contracted bandwidth of 5 Mbps. Policing ensures that if the customer's traffic exceeds this 5 Mbps limit, the excess traffic is immediately dropped, maintaining the agreed-upon service level.

Token Bucket Algorithm

The Token Bucket Algorithm is a method used by both Traffic Shaping and Policing to manage traffic rates. It involves a bucket that fills with tokens at a specified rate. Each packet consumes tokens, and if there are enough tokens, the packet is sent or received. If not, the packet is delayed (in shaping) or dropped (in policing).

Example: Imagine a bucket filling with tokens at a rate of 1 token per second. Each packet requires 1 token to be sent. If the bucket has 10 tokens, it can send 10 packets immediately. If the bucket is empty, packets must wait until tokens are available (shaping) or are dropped (policing).

Burst Size

Burst Size is the maximum amount of traffic that can be sent or received in a short period. It allows for temporary spikes in traffic without triggering shaping or policing mechanisms, ensuring that short bursts of traffic are accommodated.

Example: In a network with a CIR of 1 Mbps and a Burst Size of 2 Mbps, the network can handle short bursts of up to 2 Mbps without triggering any shaping or policing actions. This ensures that occasional high traffic volumes are accommodated without disruption.

CIR (Committed Information Rate)

The Committed Information Rate (CIR) is the guaranteed rate at which traffic is allowed to flow. It is the baseline rate that Traffic Shaping and Policing aim to maintain, ensuring that traffic does not exceed this rate.

Example: In a leased line connection, the CIR might be set at 10 Mbps. Traffic Shaping ensures that the traffic does not exceed this 10 Mbps rate, while Policing drops any traffic that exceeds this limit, maintaining the agreed-upon service level.