MikroTik Certified Switching Engineer (MTCSWE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface Types
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 Switching Fundamentals
3-1 Introduction to Switching
3-2 MAC Addresses
3-3 Ethernet Frame Structure
3-4 VLAN Basics
3-5 Trunking and Inter-VLAN Routing
4 MikroTik SwitchOS Basics
4-1 Introduction to SwitchOS
4-2 SwitchOS Interface Types
4-3 Basic Configuration
4-4 User Management
4-5 System Logging
5 VLAN Configuration
5-1 VLAN Creation and Configuration
5-2 VLAN Trunking Protocol (VTP)
5-3 Inter-VLAN Routing
5-4 VLAN Security
6 Spanning Tree Protocol (STP)
6-1 Introduction to STP
6-2 STP Operation
6-3 Rapid Spanning Tree Protocol (RSTP)
6-4 Multiple Spanning Tree Protocol (MSTP)
6-5 STP Configuration
7 Link Aggregation
7-1 Introduction to Link Aggregation
7-2 Link Aggregation Control Protocol (LACP)
7-3 Static Link Aggregation
7-4 Link Aggregation Configuration
8 Quality of Service (QoS)
8-1 Introduction to QoS
8-2 QoS Models
8-3 Traffic Shaping and Policing
8-4 QoS Configuration
9 Security Features
9-1 Introduction to Network Security
9-2 Port Security
9-3 Access Control Lists (ACLs)
9-4 DHCP Snooping
9-5 Dynamic ARP Inspection (DAI)
10 Advanced Switching Topics
10-1 Layer 3 Switching
10-2 Multicast Routing
10-3 Link Layer Discovery Protocol (LLDP)
10-4 Power over Ethernet (PoE)
11 Troubleshooting and Maintenance
11-1 Common Switching Issues
11-2 Troubleshooting Tools
11-3 Switch Maintenance
11-4 Backup and Restore
12 MikroTik Certification Exam Preparation
12-1 Exam Overview
12-2 Study Tips
12-3 Practice Questions
12-4 Exam Registration and Scheduling
MAC Addresses Explained

MAC Addresses Explained

1. What is a MAC Address?

A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. A MAC address is typically represented as six groups of two hexadecimal digits, separated by colons or hyphens, such as 00:1A:2B:3C:4D:5E.

2. Structure of a MAC Address

A MAC address consists of 48 bits, divided into two parts: the Organizationally Unique Identifier (OUI) and the Network Interface Controller (NIC) specific address. The first 24 bits (three octets) represent the OUI, which is assigned by the IEEE to manufacturers. The remaining 24 bits are assigned by the manufacturer to uniquely identify each network interface.

Example: In the MAC address 00:1A:2B:3C:4D:5E, the OUI is 00:1A:2B, and the NIC specific address is 3C:4D:5E. The OUI 00:1A:2B might be assigned to a specific manufacturer, such as Cisco, while the NIC specific address 3C:4D:5E is unique to a particular network interface card produced by that manufacturer.

3. Role of MAC Addresses in Networking

MAC addresses play a crucial role in local network communication. When a device wants to communicate with another device on the same local network, it uses the destination device's MAC address. The MAC address is used at the data link layer to ensure that data frames are delivered to the correct device. Routers and switches use MAC addresses to forward data packets to the appropriate destination within a local network.

Example: When a computer on a local network wants to send data to another computer, it first checks the destination IP address. If the destination is on the same local network, the computer uses ARP (Address Resolution Protocol) to find the MAC address of the destination device. The data is then encapsulated in a frame with the destination MAC address and sent over the network.

4. MAC Address Spoofing

MAC address spoofing is the act of changing the MAC address of a network interface to impersonate another device. This can be done for various reasons, such as bypassing network access controls or hiding the identity of a device. However, MAC address spoofing can also be used maliciously to perform network attacks.

Example: Suppose a network administrator has implemented MAC address filtering to restrict access to the network. A user might spoof their MAC address to match one of the allowed addresses, thereby gaining unauthorized access to the network. This is why relying solely on MAC address filtering for security is not recommended.