We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBlanca Rhoden
Modified about 1 year ago
MikroTik Vendor Session © MikroTik MikroTik Vendor Session WISPNOG February th, 2005 Chicago, IL
MikroTik Vendor Session© MikroTik RouterOS Features Routing. Static or dynamic, policy routing. Bridging. Spanning tree protocol, multiple bridge interfaces, bridge firewall Servers and Clients: DHCP, PPPoE, PPTP, PPP, DHCP Relay. Cache: Web-proxy, DNS HotSpot Gateway Internal scripting language
MikroTik Vendor Session© MikroTik RouterOS Interfaces Ethernet 10/100, Gigabit Wireless (Atheros, Prism, CISCO/Aironet) Access Point or Station/Client mode Access Point or Station/Client mode Synchronous: V35, T1, Frame Relay Asynchronous: Onboard serial, 8- port PCI ISDN xDSL Virtual LAN (VLAN)
MikroTik Vendor Session© MikroTik Network Management Tools RouterOS offers a great number of tools : Ping, traceroute Ping, traceroute Bandwidth tester Bandwidth tester Traffic accounting Traffic accounting SNMP SNMP Torch Torch Packet Sniffer Packet Sniffer
MikroTik Vendor Session© MikroTik Quality of Service (QoS) Various queue types: RED, BFIFO, PFIFO, PCQ RED, BFIFO, PFIFO, PCQ Easy to apply Simple Queues: By source/destination network/host IP address, interface By source/destination network/host IP address, interface More complex Queue Trees: By protocol, port, connection type, hierarchical structure By protocol, port, connection type, hierarchical structure
MikroTik Vendor Session© MikroTik Per Connection Queue (PCQ) PCQ is used to equalize each particular user or each particular connection. To use PCQ, new queue type(s) must be added with argument ‘kind=pcq’ Specify the desired ‘pcq-classifier’ and ‘pcq-rate’
MikroTik Vendor Session© MikroTik PCQ Rate Set the PCQ Rate to ‘0’, if you do not want to limit subqueues, i.e, they can use the bandwidth up to ‘max- limit’, if available.
MikroTik Vendor Session© MikroTik PCQ Example If ‘limit-at’ and ‘max- limit’ are set to ‘0’, then the subqueues can take up total bandwidth available for the parent.
MikroTik Vendor Session© MikroTik PCQ in Action I queue=pcq-down max-limit=512k 128k Pcq-rate= k 128k 2 ‘users’4 ‘users’7 ‘users’
MikroTik Vendor Session© MikroTik PCQ in Action II queue=pcq-down max-limit=512k Pcq-rate=0 73k 512k 1 ‘user’7 ‘users’ 256k 2 ‘users’ 256k
MikroTik Vendor Session© MikroTik P2P Traffic Marking
MikroTik Vendor Session© MikroTik Strategy for P2P Traffic Once the P2P traffic is marked, you can apply Firewall filters to drop all P2P traffic; Firewall filters to drop all P2P traffic; Policy routing to reroute it; Policy routing to reroute it; Queues to shape P2P down. Queues to shape P2P down. Shaping is the most effective way of coping with P2P traffic Shape it all down to some [very low] limit, or, Shape it all down to some [very low] limit, or, Shape each user to different limit, or, Shape each user to different limit, or, Give each user certain amount of P2P bandwidth. Give each user certain amount of P2P bandwidth.
MikroTik Vendor Session© MikroTik P2P Shaping
MikroTik Vendor Session© MikroTik Wireless Distribution System WDS (Wireless Distribution System) allows packets to pass from one wireless AP (Access Point) to another, just as if the APs were ports on a wired Ethernet switch. APs must use the same standard (802.11a, b or g) and work on the same frequencies in order to connect to each other. WDS is used to make bridged networks across the wireless and to extend the network using wireless.
MikroTik Vendor Session© MikroTik WDS Applications AP1 and AP2 should be within RF range Test with the scan feature to see signal levels Test with the scan feature to see signal levels WISP (Level 4) license can be used in case when bridged point-to-point link is required ST AP2 ST AP1 ST BR2BR1 WDS WDS
MikroTik Vendor Session© MikroTik Wireless Distribution System STARCHAIN
MikroTik Vendor Session© MikroTik Wireless Distribution System LOOP MESH
MikroTik Vendor Session© MikroTik Wireless Distribution System Add bridge interface on both APs: /interface bridge add name=bridge1 disabled=no Add local Ethernet interface to the bridge on both APs: /interface bridge port set ether1 bridge=bridge1 Configure both AP1 and AP2 as an APs and enable WDS: /interface wireless set wlan1 mode=ap-bridge band=5ghz frequency=5300 wds-mode=dynamic wds-default- bridge=bridge1 AP2AP1 LAN WDS link
MikroTik Vendor Session© MikroTik N-Streme Protocol MikroTik proprietary (i.e., incompatible with other vendors) wireless protocol created to improve point-to-point and point-to-multipoint wireless links. Nstreme2 (Dual) works with a pair of wireless cards (Atheros chipset cards only) – one transmitting, one receiving
MikroTik Vendor Session© MikroTik N-Streme Protocol Benefits of nstreme protocol: Client polling Very low protocol overhead per frame allowing super-high data rates No protocol limits on link distance No protocol speed degradation for long link distances Dynamic protocol adjustment depending on traffic type and resource usage
MikroTik Vendor Session© MikroTik N-Streme Protocol To enable Nstreme you should make a working wireless link and then enable the nstreme protocol on the wireless link routers: /interface wireless nstreme set wlan1 enable-nstreme=yes If you want to increase the performance of the link then you need to specify one of the framer-policy, by default it is none: /interface wireless nstreme set wlan1 framer-policy=dynamic- size Now the wireless card will try to increase the performance by sending more bigger frames – it will make the frames bigger by adding multiple packets into one frame.
MikroTik Vendor Session© MikroTik N-Streme 2 Protocol Full-duplex radio setup: Both routers have 2 wireless cards. AP1: wlan1 – receiving only; wlan2 – transmitting only AP2: wlan1 – transmitting only; wlan2 – receiving only AP1 AP2 TX RX wlan1 wlan2
MikroTik Vendor Session© MikroTik Information about Configuring MikrotTik MikroTik Documentation Please see MikroTik RouterOS™ How To MikroTik RouterOS™ How To Online Reference Manual Online Reference Manual
NETWORKING COMPONENTS ASSIGNMENT 3 CREATED BY JANICE THOMPSON Instructor: James West Course: 4550.
Copyright © 2005 Rockwell Automation, Inc. All rights reserved. Ethernet Switch Features Important to EtherNet/IP.
What is Wi-Fi? Wi-Fi, or Wireless Fidelity, is freedom Wi-Fi, or Wireless Fidelity, is freedom Allows us to connect to the Internet from anywhere without.
Chapter 7 Local Area Networks: The Basics. 2 Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 04.Wireless LAN Infrastructure Devices and Network Architecture.
Peer to Peer Client Server Two Types of Networks.
Version 4.1 CCNA Discovery 2– Chapter 7. Contents 7.1: ISP Services : TCP / IP Protocols 7.2: 7.3: DNS 7.3: 7.4: Application Layer Protocols 7.4.
Introduction to the WatchGuard AP Device WatchGuard Training.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ROUTE v6 Chapter 5 1 Chapter 5: Implement Path Control CCNP ROUTE: Implementing IP.
Objectives: Chapter 7: Intranet LAN Design * Goals and considerations in LAN design * Understand the steps in systematic LAN design * Design issues associated.
Point-to-Point Protocol (PPP) In order for any layer 3 protocol to traverse the WAN over a dialup or dedicated link, it must be encapsulated by a data-link.
Networking Fundamentals John Bellavance CCNI. Data Networks Developed because companies wanted to exchange info over long distances. At first they used.
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs Wireless LAN Security.
Mitigating Layer 2 Attacks Securing Layer 2 Access.
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
1RD-CSY3021. Preventing Propagation of routing information When using an on-demand WAN link To minimize, or stop entirely, the exchange of routing update.
BZUPAGES.COM BSIT BZUPAGES.COM BSIT ON.
Chapter 2 Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Wireless Technology. Similarities Between WLAN and LAN A wireless LAN is an 802 LAN. Transmits data using RF carriers vs. data over the wire Looks like.
CWSP Guide to Wireless Security Enterprise Wireless Hardware Security.
Objectives: Chapter 1: Introduction Types of Networks OSI Reference Model (7 Layers) TCP/IP Model Network Devices Network Topologies.
Introduction to IP Routing Geoff Huston
Network Topology Physical & Logical Topology Bus Topology Ring Topology Star Topology Tree Topology Mesh Topology Combined Topologies.
AARP Tax-Aide Sonoma/Napa District Bill Dornbush, TC Guide to Printer Sharing.
Chapter 4 Internet Architecture. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OVERVIEW What is a Network? IP Addresses Networks Information Transfer.
A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate.
Routers Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1 ST (E.C.)
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
1. 2 Layer 2 Switching Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing.
© 2016 SlidePlayer.com Inc. All rights reserved.