Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
1. Setup router
//to create a name for network card
//to assign ip address to network card
//to create NAT rule
//to assign gateway
//to assign dns
//to create dhcp
2.Create login page(Hotspot)
How to link from Mikrotik to Radius server
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
1. Setup router
//to create a name for network card
//to assign ip address to network card
//to create NAT rule
//to assign gateway
//to assign dns
//to create dhcp
2.Create login page(Hotspot)
How to link from Mikrotik to Radius server
Mikrotik IP Settings For Performance and SecurityGLC Networks
Webinar topic: Mikrotik IP Settings For Performance and Security
Presenter: Achmad Mardiansyah
In this webinar series, we discussed about Mikrotik IP Settings For Performance and Security
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/9ldLm969rxo
in this webinar, we were discussing about one important mikrotik feature that is firewall, with focus on filter table. we start the presentation from the introduction of mikrotik and firewall, and then the filter table. we also do demo and QA and the end of presentation.
the recording is available on youtube: https://www.youtube.com/channel/UCI611_IIkQC0rsLWIFIx_yg
In this webinar, we are talking about BGP implementation on mikrotik router. the presentation starts with the fundamental of BGP and then discuss about Basic BGP setting on RouterOS
Webinar topic: Mikrotik Bridge Deep Dive
Presenter: Achmad Mardiansyah
In this webinar series, we will discuss about Mikrotik Bridge Deep Dive
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/AISGc9AGJtE
in this webinar, we will discuss about the fundamental concept of VLAN, and how it is implemented on Mikrotik devices (Routerboard router and Cloud Router Switch - CRS). instructor will do a demo and QA session
Webinar topic: ISP Load Balancing with Mikrotik ECMP
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing ISP Load Balancing with Mikrotik ECMP
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/pUy6-EOy2mM
Webinar topic: Mikrotik Fastpath vs Fasttrack
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Fastpath vs Fasttrack
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/et6MwYY0dvo
With the emerging security threat nowadays, we should know how to detect and analyze every possible threat to your network.
Just with simple solution we could make our MikroTik to became a powerful tool to fool the hacker.
MikroTik as Low Interaction HoneyPot.
Webinar topic: Layer 7 Firewall on Mikrotik
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Network Security with Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/Z0Akaksp0DA
How to manage internet clients of an ISP with PPPoE and MikroTik. For
centralized AAA (Authentication, Authorization and Accounting), freeRadius is used.
There are several categories info that is what MITS current carrying in 5G application. You are welcome to contact us for more info.
1. more options for 1588 GM/Sync-E to support LLS-C1/C2/C3
2. FPGA SoC, SmartNIC for 5G RU/DU/CU applications
3. Optics for 5G fronthaul -- 10G/25G
4. High Power PoE 802.3bt (upto 90W/PSE & 71W/PD)
5. Signal Integrity tools -- De-embedded SW + True Odd Probe (upto 70Ghz)
Mikrotik IP Settings For Performance and SecurityGLC Networks
Webinar topic: Mikrotik IP Settings For Performance and Security
Presenter: Achmad Mardiansyah
In this webinar series, we discussed about Mikrotik IP Settings For Performance and Security
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/9ldLm969rxo
in this webinar, we were discussing about one important mikrotik feature that is firewall, with focus on filter table. we start the presentation from the introduction of mikrotik and firewall, and then the filter table. we also do demo and QA and the end of presentation.
the recording is available on youtube: https://www.youtube.com/channel/UCI611_IIkQC0rsLWIFIx_yg
In this webinar, we are talking about BGP implementation on mikrotik router. the presentation starts with the fundamental of BGP and then discuss about Basic BGP setting on RouterOS
Webinar topic: Mikrotik Bridge Deep Dive
Presenter: Achmad Mardiansyah
In this webinar series, we will discuss about Mikrotik Bridge Deep Dive
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/AISGc9AGJtE
in this webinar, we will discuss about the fundamental concept of VLAN, and how it is implemented on Mikrotik devices (Routerboard router and Cloud Router Switch - CRS). instructor will do a demo and QA session
Webinar topic: ISP Load Balancing with Mikrotik ECMP
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing ISP Load Balancing with Mikrotik ECMP
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/pUy6-EOy2mM
Webinar topic: Mikrotik Fastpath vs Fasttrack
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Fastpath vs Fasttrack
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/et6MwYY0dvo
With the emerging security threat nowadays, we should know how to detect and analyze every possible threat to your network.
Just with simple solution we could make our MikroTik to became a powerful tool to fool the hacker.
MikroTik as Low Interaction HoneyPot.
Webinar topic: Layer 7 Firewall on Mikrotik
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Network Security with Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/Z0Akaksp0DA
How to manage internet clients of an ISP with PPPoE and MikroTik. For
centralized AAA (Authentication, Authorization and Accounting), freeRadius is used.
There are several categories info that is what MITS current carrying in 5G application. You are welcome to contact us for more info.
1. more options for 1588 GM/Sync-E to support LLS-C1/C2/C3
2. FPGA SoC, SmartNIC for 5G RU/DU/CU applications
3. Optics for 5G fronthaul -- 10G/25G
4. High Power PoE 802.3bt (upto 90W/PSE & 71W/PD)
5. Signal Integrity tools -- De-embedded SW + True Odd Probe (upto 70Ghz)
Introducing the Future of Data Center Interconnect NetworksADVA
Our ADVA FSP 3000 CloudConnect™ is the future of Data Center Interconnect (DCI) networks. It’s a highly scalable, energy efficient and truly open platform. With our DCI technology, there are no more limits, no more restrictions. A new era of possibilities has arrived.
Scalable Service-Oriented Middleware over IPDai Yang
ABSTRACT
Due to the increased amount of communication in cars, a reliable and easy to use middleware system for automotive applications becomes a popular research field. In this paper, we review a recent approach: the Scalable Service-Oriented Middleware over IP (SOME/IP). We present current tech- nologies and how SOME/IP differs from them. We point out how SOME/IP is ordered into the ISO/OSI layer model and discuss its service orientation. We also present the ad- vantages and disadvantages of SOME/IP. In the end, we analyze its timing behavior and whether it is suitable for automotive software or not.
Technical overview of new cisco catalyst multigigabit switchesCisco Mobility
Learn how Cisco Catalyst switches can help you take advantage of unprecedented wireless speeds (up to 6.8 Gb/s) without replacing your existing cable.
TechWiseTV Workshop: Technical Overview of New Cisco Catalyst Multigigabit Switches: http://tools.cisco.com/gems/cust/customerSite.do?METHOD=W&LANGUAGE_ID=E&SEMINAR_CODE=S22149&PRIORITY_CODE=000648797
IoT protocols or Pay per Use (but my washing machine couldn't pay)
"Pay per Use is 'the next big' business model where you only pay for a thing when you use it, which could be a digital or a physical thing.
Mostly an Internet connection is required for the payment, but what happens when e.g., your washing machine is too far away from your Wi-Fi connection? In my presentation I'll talk about "our" Revenue Cloud. The main part will be about different IoT protocols as alternative to a Wi-Fi connection."
https://www.meetup.com/IoTMunich/events/249742137/
SGS-5240-20S4C4XR is a Layer 2+ Stackable Managed Gigabit Switch that provides high-density performance, Layer 3 static routing with 10Gbps uplink interfaces delivered in a rugged, strong case.
The administrator can flexibly choose the suitable SFP/SFP+ transceiver according to the transmission distance or the transmission speed required to extend the 10G network efficiently.
Contact us
Tel: +91-7875432180 Email: sales@bbcpl.in
Website: https://bbcpl.in
The RUGGEDCOM RSG920P is a rugged, high density, small form factor Layer 2 switch with Power-over-Ethernet (PoE) capability, designed for space limited cabinets with high bandwidth requirements. Tested and certified to withstand extreme temperature, vibration and shock, the RUGGEDCOM RSG920P offers exceptional reliability for industrial applications such as transportation systems and oil and gas applications.
Chapter 7: Objectives
--------------------------------------------
Explain the basic operation of dynamic routing protocols.
Compare and contrast dynamic and static routing.
Determine which networks are available during an initial network discovery phase.
Define the different categories of routing protocols.
Describe the process by which distance vector routing protocols learn about other networks.
Identify the types of distance-vector routing protocols.
Configure the RIP routing protocol.
Configure the RIPng routing protocol.
Explain the process by which link-state routing protocols learn about other networks.
Describe the information sent in a link-state update.
Describe advantages and disadvantages of using link-state routing protocols.
Identify protocols that use the link-state routing process. (OSPF, IS-IS)
Determine the route source, administrative distance, and metric for a given route.
Explain the concept of a parent/child relationship in a dynamically built routing table.
Compare the IPv4 classless route lookup process and the IPv6 lookup process.
Analyze a routing table to determine which route will be used to forward a packet.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 11 - Network Address Translation for IPv4Yaser Rahmati
Chapter 11: Objectives
------------------------------------------------------
Describe NAT characteristics.
Describe the benefits and drawbacks of NAT.
Configure static NAT using the CLI.
Configure dynamic NAT using the CLI.
Configure PAT using the CLI.
Configure port forwarding using the CLI.
Configure NAT64.
Use show commands to verify NAT operation.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 10: Objectives
------------------------------------------------------
Describe the operation of DHCPv4 in a small-to-medium-sized business network.
Configure a router as a DHCPv4 server.
Configure a router as a DHCPv4 client.
Troubleshoot a DHCP configuration for IPv4 in a switched network.
Explain the operation of DHCPv6.
Configure a stateless DHCPv6 for a small-to-medium-sized business.
Configure a stateful DHCPv6 for a small-to-medium-sized business.
Troubleshoot a DHCP configuration for IPv6 in a switched network.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 9: Objectives
-----------------------------------------------------------
Explain how ACLs are used to filter traffic.
Compare standard and extended IPv4 ACLs.
Explain how ACLs use wildcard masks.
Explain the guidelines for creating ACLs.
Explain the guidelines for placement of ACLs.
Configure standard IPv4 ACLs to filter traffic according to networking requirements.
Modify a standard IPv4 ACL using sequence numbers.
Configure a standard ACL to secure vty access.
Explain the structure of an extended access control entry (ACE).
Configure extended IPv4 ACLs to filter traffic according to networking requirements.
Configure an ACL to limit debug output.
Explain how a router processes packets when an ACL is applied.
Troubleshoot common ACL errors using CLI commands.
Compare IPv4 and IPv6 ACL creation.
Configure IPv6 ACLs to filter traffic according to networking requirements.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 6: Objectives
-----------------------------------------------
Explain the advantages and disadvantages of static routing.
Explain the purpose of different types of static routes.
Configure IPv4 and IPv6 static routes by specifying a next-hop address.
Configure an IPv4 and IPv6 default routes.
Explain the use of legacy classful addressing in network implementation.
Explain the purpose of CIDR in replacing classful addressing.
Design and implement a hierarchical addressing scheme.
Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
Configure a floating static route to provide a backup connection.
Explain how a router processes packets when a static route is configured.
Troubleshoot common static and default route configuration issues.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 4: Objectives
-------------------------------------------------
Configure a router to route between multiple directly connected networks
Describe the primary functions and features of a router.
Explain how routers use information in data packets to make forwarding decisions in a small- to medium-sized business network.
Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.
Compare ways in which a router builds a routing table when operating in a small- to medium-sized business network.
Explain routing table entries for directly connected networks.
Explain how a router builds a routing table of directly connected networks.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 02 - Introduction to Switched NetworksYaser Rahmati
Chapter 2: Objectives
--------------------------------------------------
Upon completion of this chapter, you will be able to:
Explain the advantages and disadvantages of static routing.
Configure initial settings on a Cisco switch.
Configure switch ports to meet network requirements.
Configure the management switch virtual interface.
Describe basic security attacks in a switched environment.
Describe security best practices in a switched environment.
Configure the port security feature to restrict network access.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 3: Objectives
---------------------------------------------------
Explain the purpose of VLANs in a switched network.
Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment.
Configure a switch port to be assigned to a VLAN based on requirements.
Configure a trunk port on a LAN switch.
Configure Dynamic Trunk Protocol (DTP).
Troubleshoot VLAN and trunk configurations in a switched network.
Configure security features to mitigate attacks in a VLAN-segmented environment.
Explain security best practices for a VLAN-segmented environment.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
7. https://www.instagram.com/yaser.rahmati
Introduce Yourself
• Please, introduce yourself to the class :
• Name : YASER RAHMATI
• Company : MINISTRY OF ICT, PROVINCIAL OFFICE
• Previous knowledge about RouterOS : EXCELLENT
• Previuos knowledge about networking : EXCELLENT
• What do you expect from this course ? WIRELESS COMMUNICATION
• Please remember your class ID : 10
14. https://www.instagram.com/yaser.rahmati
Product Naming
• Type 1. 3-symbol name
• 1st symbol stands for series (this can either be a number or a letter)
• 2nd digit for indicating number of potential wired interfaces (Ethernet, SFP, SFP+)
• 3rd digit for indicating number of potential wireless interfaces (built-in and mPCI and mPCIe slots)
• Type2. Word
• OmniTIK, Groove, SXT, SEXTANT, Metal, LHG, DynaDish, cAP, wAP, LDF, DISC, mANTBox, QRT,
DynaDish, cAP, hAP, hEX
• Exceptional naming
• 600, 800, 1000, 1100, 1200, 2011, 3011 boards
Board Name Board Features Built-in wireless
Wireless Card
Features
Connector Type Enclosure Type
15. https://www.instagram.com/yaser.rahmati
Product Naming
• U - USB
• P - power injection with controller
• i - single port power injector without controller
• A - more memory and (or) higher license level
• H - more powerful CPU
• G - Gigabit (may include "U","A","H", if not used with "L")
• L - light edition
• S - SFP port (legacy usage - SwitchOS devices)
• e - PCIe interface extension card
• x<N> - where N is number of CPU cores ( x2, x16, x36 etc)
• R - MiniPCI or MINIPCIe slot
Board Name Board Features Built-in wireless
Wireless Card
Features
Connector Type Enclosure Type
16. https://www.instagram.com/yaser.rahmati
Product Naming
• 5 - 5Ghz
• 2 - 2.4Ghz
• 52 - dual band 5Ghz and 2.4Ghz
Board Name Board Features
Wireless Card
Features
Connector Type Enclosure Type
band power_per_chain protocol number_of_chains
Built-in wireless
17. https://www.instagram.com/yaser.rahmati
Product Naming
• (not used) - "Normal" - <23dBm at 6Mbps 802.11a; <24dBm at 6Mbps 802.11g
• H - "High" - 23-24dBm at 6Mbps 802.11a; 24-27dBm at 6Mbps 802.11g
• HP - "High Power" - 25-26dBm 6Mbps 802.11a; 28-29dBm at 6Mbps 802.11g
• SHP - "Super High Power" - 27+dBm at 6Mbps 802.11a; 30+dBm at 6Mbps 802.11g
Board Name Board Features
Wireless Card
Features
Connector Type Enclosure Type
band power_per_chain protocol number_of_chains
Built-in wireless
18. https://www.instagram.com/yaser.rahmati
Product Naming
• (not used) - for cards with only 802.11a/b/g support
• n - for cards with 802.11n support
• ac - for cards with 802.11ac support
Board Name Board Features
Wireless Card
Features
Connector Type Enclosure Type
band power_per_chain protocol number_of_chains
Built-in wireless
19. https://www.instagram.com/yaser.rahmati
Product Naming
• (not used) - single chain
• D - dual chain
• T - triple chain
Board Name Board Features
Wireless Card
Features
Connector Type Enclosure Type
band power_per_chain protocol number_of_chains
Built-in wireless
20. https://www.instagram.com/yaser.rahmati
Product Naming
• (not used) - only one connector option on the model
• MMCX - MMCX connector type
• u.FL - u.FL connector type
Board Name Board Features Built-in wireless
Wireless Card
Features
Connector Type Enclosure Type
micro-miniature coaxial (MMCX)
Ultraminiature Coax Connector (u.FL)
21. https://www.instagram.com/yaser.rahmati
Product Naming
• (not used) - main type of enclosure for a product
• BU - board unit (no enclosure) RM - rack-mount enclosure
• IN - indoor enclosure
• EM - extended memory
• LM - light memory
• BE - black edition case
• TC - Tower (vertical) case
• OUT - outdoor enclosure
Board Name Board Features Built-in wireless
Wireless Card
Features
Connector Type Enclosure Type
• SA - sector antenna enclosure (for SXT)
• HG - high gain antenna enclosure (for SXT)
• BB - Basebox enclosure (for RB911)
• NB - NetBox enclosure (for RB911)
• NM - NetMetal enclosure (for RB911)
• QRT - QRT enclosure (for RB911)
• SX - Sextant enclosure (for RB911,RB711)
• PB - PowerBOX enclosure (for RB750P, RB950P)
• PC - PassiveCooling enclosure (for CCR)
• TC - Tower (vertical) Case enclosure (for hEX, hAP )
22. https://www.instagram.com/yaser.rahmati
Example : RB912UAG-5HPnD
• RB : RouterBOARD
• 912
9 : 9th series board
1 : 1 wired (Ethernet) interface
2 : two wireless interfaces (built-in and miniPCIe)
• UAG
U : has USB port
A : more memory
G : gigabit Ethernet
• 5HPnD
5 : has built in 5GHz
HP : high power
D , n : dual chain wireless card with 802.11n support
23. https://www.instagram.com/yaser.rahmati
Example : hAP ac lite (RB952Ui-5ac2nD)
• RB : RouterBOARD
• 952
9 : 9th series board
5 : 5 wired (Ethernet) interface
2 : two wireless interfaces (built-in and miniPCIe)
• Ui
U : has USB port
i : single port power injector without controller
• 5ac2nD
52 : dual band 5GHz and 2 GHz
ac : for cards with 802.11ac support
D , n : dual chain wireless card with 802.11n support
25. https://www.instagram.com/yaser.rahmati
Memory
• Impact on features (logging , queues , webproxy , hotspot)
• RouterOS use small amount of RAM, but other features like qeues , log
, webproxy , firewall will eat memory.
Model Size of RAM
hAP ac lite 64 MB
RB2011UiAS-2HnD-IN 128 MB
27. https://www.instagram.com/yaser.rahmati
Power Features
• PoE In
• Receive power via Ethernet cable
• PoE Out
• Supply power to other devices
• Ports 2-5 can supply with the same voltage as applied to the unit.
• Less power adaptors and cables to worry about!
• Max current is 500mA per port.
RB750UP
28. https://www.instagram.com/yaser.rahmati
MikroTik RouterOS
• Definition :
• MikroTik RouterOS is router operating system and software which turns
regular PC or MikroTik RouterBOARD hardware into a dedicated router.
• Keywords :
1. is the operating system of MikroTik
2. based on the Linux kernel
3. can be installed on (1- PC) and (2- Virtual machine)
4. RouterBOARD devices come preinstalled with RouterOS.
29. https://www.instagram.com/yaser.rahmati
RouterOS Features
12. Telnet/mac-telnet/ssh/console admin
13. Real-time configuration and monitoring
14. 3G/LTE support
15. OpenFlow support
1. 802.11a/b/g/n/ac support
2. Custom Nv2 TDMA protocol
3. Advanced Quality of Service
4. Stateful firewall, tunnels
5. STP bridging with filtering
6. WDS and Virtual AP
7. HotSpot for Plug-and-Play access
8. RIP, OSPF, BGP, MPLS routing
9. Remote WinBox GUI and Web admin
10. High availability with VRRP
11. Bonding of Interfaces
32. https://www.instagram.com/yaser.rahmati
Installing RouterOS on an x86 machine
• Download the ISO image, form : https://mikrotik.com/download
• Your new router will run for 24 hours without a license
• Turn it off to stop the timer.
• During this time you can try all the features of RouterOS.
LAB 1 : install RouterOS in VMware workstation
33. https://www.instagram.com/yaser.rahmati
License Levels
• After installation, RouterOS runs in trial mode.
• You have 24 hours to register for Level1 or purchase Level 3,4,5 or 6.
• Level 3 is a wireless station (client or CPE) only license.
• For x86 PCs, Level3 is not available for purchase individually.
• For ordering more than 100 L3 licenses, contact sales@mikrotik.com
• Level 2 was a transitional license from old legacy (pre 2.8) license format.
• These licenses are not available anymore.
36. https://www.instagram.com/yaser.rahmati
MikroTik RouterBOARD
• A family of hardware solutions created by MikroTik that can run RouterOS
• Ranging from small home routers to carrier-class access concentrators
• Millions of RouterBOARDs are currently routing the world
RB952Ui-5ac2nD RBSXT5HacD2n RB2011Uias-2HnD-IN
38. https://www.instagram.com/yaser.rahmati
First time startup
There are various ways how to connect to it:
1. Accessing Command Line Interface (CLI) via
• Telnet
• SSH
• serial cable
• keyboard and monitor if your router has a VGA card.
2. Accessing Web based GUI (WebFig)
3. Using the WinBox configuration utility
• Download : https://mikrotik.com/download
40. https://www.instagram.com/yaser.rahmati
WinBox
• Small utility that allows administration of MikroTik RouterOS using a
fast and simple GUI.
• A native Win32 binary, but can be run on Linux and MacOS (OCX)
using Wine.
• To connect to the router , enter IP or MAC address of the router.
43. https://www.instagram.com/yaser.rahmati
LAB3
• Task 1 : Observe WinBox title when connected using MAC address
• Task 2 : Observe WinBox title when connected using IP address.
• Task 3 :
• Disable IP address on the bridge interface and try to log in the router using IP address (not possible)
• Then try to log in the router using MAC WinBox (works)
• Enable IP address on the bridge interface. Log in the router using IP address.
58. https://www.instagram.com/yaser.rahmati
Router Identity
• Setting the System's Identity provides a
unique identifying name for when :
1. the system identifies itself to other routers in
the network
2. accessing services such as :
• DHCP
• Neighbour Discovery
• default wireless SSID
• The default system Identity is set to
'MikroTik'.
System → Identity
61. https://www.instagram.com/yaser.rahmati
RouterOS Users
• MikroTik RouterOS router user facility manage the users connecting the
router from :
1. local console
2. serial terminal
3. telnet,
4. SSH
5. Winbox
• Each user is assigned to a user group, which denotes the rights of this user.
• A group policy is a combination of individual policy items.
62. https://www.instagram.com/yaser.rahmati
Group Policies
1. local - policy that grants rights to log in locally via console
2. telnet - policy that grants rights to log in remotely via telnet
3. ssh - policy that grants rights to log in remotely via secure shell protocol
4. web - policy that grants rights to log in remotely via WebFig.
5. winbox - policy that grants rights to log in remotely via WinBox.
63. https://www.instagram.com/yaser.rahmati
Group Policies
6. password - policy that grants rights to change the password
7. api - grants rights to access router via API.
8. tikapp - policy that grants rights to log in remotely via Tik-App.
9. dude - grants rights to log in to dude server.
10. ftp - policy that grants full rights to log in remotely via FTP.
65. https://www.instagram.com/yaser.rahmati
Package Management
• RouterOS functions are enabled/disabled by packages.
• Packages are provided only by MikroTik and no 3rd parties are
allowed to make them.
• For a simple home router, only the system package is needed for basic
operation, other packages are optional.
68. https://www.instagram.com/yaser.rahmati
Working with packages
1. disable
• schedule the package to be disabled after the next reboot. No features provided by the package will be accessible
2. downgrade
• will prompt for the reboot. During the reboot process will try to downgrade the RouterOS to the oldest version
possible by checking the packages that are uploaded to the router.
3. print
• outputs information about the packages, like: version, package state, planned state changes etc.
4. enable
• schedule package to be enabled after the next reboot
5. uninstall
• schedule package to be removed from the router. That will take place during the reboot.
6. unschedule
• remove scheduled task for the package.
70. https://www.instagram.com/yaser.rahmati
RouterOS Services
• Different ways to connect to RouterOS
1. API : Application Programming Interface
2. FTP : for uploading/downloading files to/from the RouterOS
3. SSH : secure command line interface
4. Telnet : insecure command line interface
5. WinBox : GUI access
6. WWW : access from the web browser
84. https://www.instagram.com/yaser.rahmati
Notes (for export file)
• Download to a computer using WinBox (drag&drop), FTP or WebFig
• Don’t store the copy of the backup file only on the router!
• Export file can be edited by hand
• Can be used to move configuration to a different RouterBOARD
• Restore using ‘/import’ command
89. https://www.instagram.com/yaser.rahmati
Reset to Factory Default Settings (physical reset)
• Turn off the device power.
• Hold the reset button ad do not release.
• Turn on the device power and wait until the USER LED labeled with “ACT” flashing.
• Now release the button to clear configuration.
• Wait for a few minutes for the router to clear and restore the factory settings.
90. https://www.instagram.com/yaser.rahmati
Upgrading the RouterOS
• Download the update from :
• https://mikrotik.com/download
• Check the architecture of your router’s CPU
• Drag&drop into the WinBox window
• Other ways : Webfig File menu, FTP, sFTP
• Reboot the router
96. https://www.instagram.com/yaser.rahmati
DHCP
• Dynamic Host Configuration Protocol
• Used for automatic IP address distribution over a local network
• Used DHCP only in trusted networks
• Works within a broadcast domain
• RouterOS supports both DHCP client and DHCP server
111. https://www.instagram.com/yaser.rahmati
Bridge
• Bridges are OSI layer 2 devices
• Bridge is a transport device
• Traditionally used to join two network segments
• Bridges splits collision domain in 2 parts
• Network switch is multi-port bridge
• Each port is a collision domain of one device
115. https://www.instagram.com/yaser.rahmati
Bridge
• RouterOS implements software bridge
• Ethernet, wireless, SFP and tunnel interfaces can be added to a bridge
• Default configuration on SOHO routers bridge wireless with ether2 port
• Ether2-5 are combined together in a switch
• Ether2 is master
• Ether3-5 are slave
119. https://www.instagram.com/yaser.rahmati
LAB2
1. We are going to create one big network by bridging local Ethernet
with wireless (internet) interface
2. All the laptops will be in the same network
3. Note :
• Be careful when bridging networks !
• Create a backup before starting this LAB!
122. https://www.instagram.com/yaser.rahmati
Layer 3 Concept
• Logical address
• 2 versions :
• IPv4 (our focus)
• IPv6
• Consist of
• Network part
• Host part
• Can be class based IP address
• Class A (N.H.H.H)
• Class B (N.N.H.H)
• Class C (N.N.N.H)
128. https://www.instagram.com/yaser.rahmati
Routing
• DST.ADDRESS
• Networks which can be reached
• GATEWAY
• IP address of the next router to reach the destination
• DEFAULT GAYEWAY
• A router (next hop) where all the traffic for which there is no specific destination defined will
be sent
• It is distinguished by 0.0.0.0/0 destination mask
129. https://www.instagram.com/yaser.rahmati
Route Distance
• Cisco documentation describes "administrative distance" as :
This is the measure of trustworthiness of the source of the route.
• If a router learns about a destination from more than one routing
protocol, administrative distance is compared and the preference is
given to the routes with lower administrative distance.
138. https://www.instagram.com/yaser.rahmati
Goals
• To be able to calculate how far we can go with the
equipment we have
• To understand why we need high masts for links
• To learn about software that helps to automate the
process of planning radio links
140. https://www.instagram.com/yaser.rahmati
Free Space Loss
• Signal power is diminished by geometric spreading of
the wave front, commonly known as Free Space Loss.
• The power of the signal is spread over a wave front, the
area of which increases as the distance from the
transmitter increases. Therefore, the power density
diminishes.
141. https://www.instagram.com/yaser.rahmati
Free Space Loss (@2.45 GHz)
• Using decibels to express the loss and using 2.4 GHz as the
signal frequency, the equation for the Free Space Loss is:
Lfs = 100 + 20×log(D)
• ...where Lfs is expressed in dB and D is in kilometers.
142. https://www.instagram.com/yaser.rahmati
Free Space Loss (any frequency)
• Using decibels to express the loss and using a generic frequency f,
the equation for the Free Space Loss is:
Lfs = 32.45 + 20×log(D) + 20×log(f)
• ...where Lfs is expressed in dB, D is in kilometers and f is in MHz.
145. https://www.instagram.com/yaser.rahmati
Link budget
• The performance of any communication link depends on the quality of the
equipment being used.
• Link budget is a way of quantifying the link performance.
• The received power in an 802.11 link is determined by three factors:
1. transmit power
2. transmitting antenna gain
3. receiving antenna gain
146. https://www.instagram.com/yaser.rahmati
Link budget
• If that power, minus the free space loss of the link path, is greater than the
minimum received signal level of the receiving radio, then a link is possible.
• The difference between the minimum received signal level and the actual
received power is called the link margin.
• The link margin must be positive, and should be maximized (should be at least
10dB or more for reliable links).
148. https://www.instagram.com/yaser.rahmati
Example link budget calculation
1. Let’s estimate the feasibility of a 5 km link, with one access point and one
client radio.
2. The access point is connected to an antenna with 10 dBi gain, with a
transmitting power of 20 dBm and a receive sensitivity of -89 dBm.
3. The client is connected to an antenna with 14 dBi gain, with a transmitting
power of 15 dBm and a receive sensitivity of -82 dBm.
4. The cables in both systems are short, with a loss of 2dB at each side at the 2.4
GHz frequency of operation.
150. https://www.instagram.com/yaser.rahmati
Link budget: AP to Client link
20 dBm (TX Power AP)
+ 10 dBi (Antenna Gain AP)
- 2 dB (Cable Losses AP)
+ 14 dBi (Antenna Gain Client)
- 2 dB (Cable Losses Client)
------------------------------------------------------
40 dB Total Gain
- 114 dB (free space loss @5 km)
------------------------------------------------------
- 73 dBm (expected received signal level)
- 82 dBm (sensitivity of Client)
------------------------------------------------------
8 dB (link margin)
152. https://www.instagram.com/yaser.rahmati
Link budget: AP to Client link
15 dBm (TX Power AP)
+ 14 dBi (Antenna Gain AP)
- 2 dB (Cable Losses AP)
+ 10 dBi (Antenna Gain Client)
- 2 dB (Cable Losses Client)
------------------------------------------------------
35 dB Total Gain
- 114 dB (free space loss @5 km)
------------------------------------------------------
- 78 dBm (expected received signal level)
- 89 dBm (sensitivity of Client)
------------------------------------------------------
10 dB (link margin)
155. https://www.instagram.com/yaser.rahmati
Fresnel Zone
• The Fresnel Zone is important to the integrity of the RF link because it
defines a volume around the LOS that must be clear of any obstacle
for the the maximum power to reach the receiving antenna.
158. https://www.instagram.com/yaser.rahmati
Line of Sight and Fresnel Zones
• r : radius of the zone in meters
• d1 , d2 : distances from the obstacle to the link end points in meters
• d : total link distance in meters
• f : the frequency in MHz
160. https://www.instagram.com/yaser.rahmati
Clearance of the Fresnel Zone and earth curvature
• This table shows the minimum height above flat ground required to
clear 70% of the first Fresnel zone for various link distances at 2.4
GHz.
162. https://www.instagram.com/yaser.rahmati
Example
• Calculate the size of the first Fresnel zone in the middle of a 2 km link,
transmitting at 2.437 GHz (802.11b channel 6):
• Assuming both of our towers were ten metres tall, the first Fresnel zone
would pass just 2.16 metres above ground level in the middle of the link.
𝑥 = 17.31 ×
1000 × 1000
2437 × 2000
= 7.84 (𝑚)
163. https://www.instagram.com/yaser.rahmati
Example
• But how tall could a structure at that point be to block no more than
60% of the first zone?
• Subtracting the result from 10 metres, we can see that a structure 5.3
metres tall at the centre of the link would block up to 40% of the first
Fresnel zone.
𝑥 = 0.6 × 7.84 = 4.70 (𝑚)
165. https://www.instagram.com/yaser.rahmati
What is a wave?
• Something, some medium or object, is swinging in a periodic
manner, with a certain number of cycles per unit of time.
• This kind of wave is sometimes called a mechanical wave,
since it is defined by the motion of an object or its
propagating medium.
167. https://www.instagram.com/yaser.rahmati
Example
• Calculate the wavelength for the frequency of 802.11b wireless
networking at the speed of light.
𝑓 = 2.4𝐺𝐻𝑧 = 2400000000
𝑐𝑦𝑐𝑙𝑒𝑠
𝑠𝑒𝑐𝑜𝑛𝑑𝑠
=2.4× 109
wavelength ( 𝜆) =
𝑐
𝑓
=
3×108
2.4×109=1.25× 10−1
𝑚 = 12.5(𝑐𝑚)
172. https://www.instagram.com/yaser.rahmati
Behavior of radio waves
• the longer the wavelength, the further it goes;
• the longer the wavelength, the better it travels through and around things;
• the shorter the wavelength, the more data it can transport.
174. https://www.instagram.com/yaser.rahmati
ISM / UNII bands
• Most commercial wireless devices (mobile phones, television, radio,
etc.) use licensed radio frequencies. Large organizations pay licensing
fees for the right to use those radio frequencies.
• WiFi uses unlicensed spectrum. License fees are not usually required
to operate WiFi equipment.
175. https://www.instagram.com/yaser.rahmati
ISM / UNII bands
• The Industrial, Scientific and Medical (ISM) bands allow for unlicensed use of
2.4-2.5 GHz, 5.8 GHz, and many other (non-WiFi) frequencies.
• The Unlicensed National Information Infrastructure (UNII) bands allow for
unlicensed use of the lower part of the 5 GHz spectrum (USA only).
• In Europe, the European Telecommunication Standards Institute (ETSI) has
allocated portions of the 5 GHz band.
179. https://www.instagram.com/yaser.rahmati
Example IEEE 802 Working Groups
• The IEEE 802 standards all deal with local-area networks and metropolitan-area networks .
• The standards mainly deal with the physical and data link layers of the OSI model
198. https://www.instagram.com/yaser.rahmati
Wireless Chains
• 802.11n introduced the concept of MIMO (Multiple In and
Multiple Out)
• Send and receive data using multiple radios in parallel
• 802.11n with one chain (SISO) can only achieve 72.2 Mbps
(On legacy cards 65 Mbps)
205. https://www.instagram.com/yaser.rahmati
LAB1 : Making a simple wireless AP
Step 1
• To configure an interface, double-click Wireless Interface's name, and
the config window will appear.
• To set the device as an AP, choose "ap bridge" mode.
• You can also set other things, like the desired band, frequency, SSID
(the AP identifier) and the security profile.
207. https://www.instagram.com/yaser.rahmati
LAB1 : Making a simple wireless AP
Step 2
• You probably want your AP to be secure, so you need to configure WPA2 security.
• Close the wireless setting window with OK if you are done, and move to the
Security Profiles tab of the Wireless interface window.
• There, make a new profile with the Add button and set desired WPA2 settings.
You can choose this new security profile back in the Interface configuration.
210. https://www.instagram.com/yaser.rahmati
Firewall
• A network security system that protects internal network from
outside (e.g. the internet)
• Based on rules which are analyzed sequentially until first match is
found
• RouterOS firewall rules are managed in Filter and NAT sections
211. https://www.instagram.com/yaser.rahmati
Firewall Rules
• Each rule consists of two parts :
• Matcher
• Which matches traffic flow against given conditions
• Action
• Which defines what to do with the matched packet
/ip firewall filter
add chain=input src-address=100.64.0.0/10 action=drop in-interface=<public_if>
225. https://www.instagram.com/yaser.rahmati
Address List
• The following rules will create a address list which will have your management PC ip address. an then it will
allow all ports like WINBOX, FTP, SSH, TELNET from this address list only, and rest of ips wont be able to
access these ports.
/ip firewall address-list
add list=management-servers address=10.10.0.1
/ip firewall filter
add chain=input src-address-list=management-servers protocol=tcp dst-port=21,22,23,80,443,8291 action=accept
add chain=input protocol=tcp dst-port=21,22,23,80,443,8291 action=drop
226. https://www.instagram.com/yaser.rahmati
Difference Action = drop and Action = reject
The use Action = drop
• If you choose to use the option Action = drop, then the data coming
from the client will be discarded (drop) by the router.
• This is done in secret, with no rejection message sending ICMP
(Internet Control Message Protocol).
• So if we send a ping message from CMD, then the result is Request
Timed Out (RTO).
228. https://www.instagram.com/yaser.rahmati
Difference Action = drop and Action = reject
Action = reject the use of
• As for the option Action = reject, the data packet is discarded by the
router but the router will provide rejection message packet by sending
ICMP rejection message.
• You can choose what message would be sent if using the reject option
235. https://www.instagram.com/yaser.rahmati
Source NAT or srcnat
• This type of NAT is performed on packets that are originated from a
natted network.
• A NAT router replaces the private source address of an IP packet
with a new public IP address as it travels through the router.
• A reverse operation is applied to the reply packets travelling in the
other direction.
239. https://www.instagram.com/yaser.rahmati
Destination NAT or dstnat
• This type of NAT is performed on packets that are destined to the
natted network.
• It is most comonly used to make hosts on a private network to be
accessible from the Internet.
• A NAT router performing dstnat replaces the destination IP address of
an IP packet as it travel through the router towards a private network.
244. https://www.instagram.com/yaser.rahmati
What is Quality Of Service (QoS) ?
• Referes to traffic prioritization and resource reservation
control mechanisms
• Ability to provide different priorities to different applications,
users or data flows
• Guarantee a certain level of performance to a data flow
245. https://www.instagram.com/yaser.rahmati
Objective of QoS
• Anybody can deploy internet services
• Identify what affects overall satisfaction of the client
• Capture traffic usage patterns & customize router to
dynamically work for them
• Key objective of QoS is differentiation
246. https://www.instagram.com/yaser.rahmati
Queues
Queues are used to limit and prioritize traffic:
1. limit data rate for certain IP addresses, subnets, protocols, ports, and other parameters
2. limit peer-to-peer traffic
3. prioritize some packet flows over others
4. configure traffic bursts for faster web browsing
5. apply different limits based on time
6. share available traffic among users equally, or depending on the load of the channel
247. https://www.instagram.com/yaser.rahmati
Queue Types
• RouterOS has 4 queue types:
• FIFO – Simple First In First Out (Bytes or Packets)
• RED – Random Early Detect (or Drop)
• SFQ – Stochastic Fairness Queuing
• PCQ – Per Connection Queuing (MikroTik Proprietary)
• Also, each queue type has 2 major characteristics:
• Shaper (where packets are dropped to reduce traffic)
• Scheduler (where packets are temporarily delayed)
248. https://www.instagram.com/yaser.rahmati
FIFO – First In First Out
• Behaviour: First packet in is outputted, subsequent packets wait in buffer until previous
packet has left buffer. Once buffer is full, all new incoming packets are dropped.
• Two types of FIFO :
• BFIFO – queue size is a physical buffer size (kb)
• PFIFO – queue size is a physical number of packets
• (e.g. default, default-small, ethernet-default – used in PPP, DHCP, Hotspot etc)
• NOT recommended for very congested links as once queue is full, ALL traffic is dropped
249. https://www.instagram.com/yaser.rahmati
PFIFO, BFIFO and MQ PFIFO
• These queuing disciplines are based on the FIFO algorithm (First-In First-Out).
o PFIFO is measured in packets.
o BFIFO is that one is measured in bytes.
• Every packet that cannot be enqueued (if the queue is full), is dropped.
• Large queue sizes can increase latency, but utilize channel better.
• These queues uses pfifo-limit and bfifo-limit parameters.
250. https://www.instagram.com/yaser.rahmati
Bandwidth Management
• The process of measuring and controlling the communications
(traffic , packets) on a network link
• Objective is to avoid filling the link to capacity or overfilling the link
• Results in network congestion and poor performance of the network if
not done
251. https://www.instagram.com/yaser.rahmati
Bandwidth Management in RouterOS
• Mikrotik RouterOS is one of the most advanced and easy to
configure operating system for bandwidth management
1. Traffic shaping (Rate Limiting)
• HTB , PCQ
2. Traffic equalizing (Rate Scheduler)
• RED , FIFO , SFQ
252. https://www.instagram.com/yaser.rahmati
Queuing – 100% Shaper
100% Shaper
• all new packets are dropped once ‘max-limit’ is reached.
• Size of queue is zero. It cannot hold any packets without dropping them, however latency is low.
253. https://www.instagram.com/yaser.rahmati
Queuing – 100% Shaper
• Assume max-limit is “100”
• 100% shaper has no queue size
• Therefore packets are dropped when it reaches 100
• In this example about 22% is dropped
• Result : Latency is low
254. https://www.instagram.com/yaser.rahmati
Queuing - 100% Scheduler
100% Scheduler
• Packets queued when ‘max-limit’ reached.
• Chose size of queue to hold correct number of packets, to delay their departure from the
interface long enough but latency is higher.
• When queue is full, packets are dropped.
255. https://www.instagram.com/yaser.rahmati
Queuing - 100% Scheduler
• Assume max-limit is ‘100’
• queue size is unlimited
• Therefore no packets are dropped when it
reaches 100.
• In this example 39% are delayed once, 11%
delayed twice
• Latency is high
257. https://www.instagram.com/yaser.rahmati
CIR (Committed Information Rate)
• (limit-at in RouterOS) worst case scenario, flow will get
this amount of traffic rate regardless of other traffic flows.
• At any given time, the bandwidth should not fall below this
committed rate.
259. https://www.instagram.com/yaser.rahmati
User 1
Max Limit = 10 Mbps
Limit at = 1 Mbps
User 2
Max Limit = 10 Mbps
Limit at = 1 Mbps
User 3
Max Limit = 10 Mbps
Limit at = 1 Mbps
User 1 Bandwidth = 1 Mbps Limit at
User 2 Bandwidth = 1 Mbps Limit at
User 3 Bandwidth = 1 Mbps Limit at
Shared Bandwidth = 7 Mbps
10Mbps
267. https://www.instagram.com/yaser.rahmati
LAB 2 - Specific Server Limit
•DST-address is useful to set unlimited access to
the local network resources
•Target-address and DST-addresses can be vice
versa
272. https://www.instagram.com/yaser.rahmati
WAN PPPoE Client in MikroTik Router
• MikroTik PPPoE Client is used to connect any PPPoE server.
• If your ISP provides PPPoE connection, MikroTik router is
able to connect that PPPoE server using PPPoE client.
280. https://www.instagram.com/yaser.rahmati
Ping
• Used to test the reachability of a host on an IP network
• To measure the round trip time for messages between source
and destination hosts
• Sends ICMP echo request packets
289. https://www.instagram.com/yaser.rahmati
Graphs
• RouterOS can generate graphs showing how much traffic has passed
through an interface for a queue
• Can show CPU, memory and disk usage
• For each metric there are 4 graphics :
• Daily , weekly , monthly , yearly
اگر داخل استاندارد n عرض کانال را 20 فرض و یک آنتن داشته باشیم 72.2Mbps
اگر داخل استاندارد n عرض کانال را 40 فرض و یک آنتن داشته باشیم 150Mbps
اگر داخل استاندارد n عرض کانال را 40 فرض و دوآنتن داشته باشیم 300Mps
اگر داخل استاندارد n عرض کانال را 40 فرض و یک آنتن داشته باشیم 450Mbps