networking basic concepts
Most Relevant Content
What Are the 7 Layers of OSI Model and How Do They Work
The OSI Model stands for Open Systems Interconnection Model, a conceptualized framework used to describe the seven layers of a telecommunication system or network. It was established as an international standard in the year 1984 by the International Organization for Standardization. This model helps visualize how networks operate and is still used today to figure out and solve network problems, such as by a web development company. In this article, we will talk about the 7 layers of the OSI Model and how each of them work. Layer 1 – Physical Layer The physical layer concerns the part of the model used for transmitting raw data bits (0s and 1s) across the network between sending and receiving devices. This can be through a physical cable or even a wireless connection between physical nodes. The physical layer can also represent voltages, frequencies, pin layouts, and other things. Any other physical devices part of this transmission, like hubs and modems, are also included. Ethernet, USB, Bluetooth, IEEE 802.11 etc. protocols work on Physical Layer. Layer 2 – Data Link Layer The data link layer is in charge of establishing or eliminating a connection between physical nodes that may be connected through a [...]
- »
Computer Networking Basics | February 10, 2017
Computer networking is a buzzword to the present world. By the virtue of computer networking, the world has become just like a village. So, anyone of the world can communicate with any person of the world within seconds as if they are living in a village. Computer networking does not mean a single element. A lot of networking elements and protocol work behind a computer networking. So, the computer guys who are interested to learn how computer networking works should [...]
- »
MikroTik Hotspot HTTPS Redirect and HTTPS Login Setup | May 24, 2020
MikroTik Hotspot is one of the most popular services in MikroTik Router. It is a policy to authorize network clients before to access local network resources as well as public network resources through MikroTik Router. In my previous article I discussed MikroTik Hotspot Configuration using Winbox. But default MikroTik Hotspot configuration faces HTTPS Redirect and HTTPS Login issues. To solve these issues, MikroTik Hotspot HTTPS configuration is required. So, in this article I will discuss how to configure MikroTik Hotspot [...]
- »
Boost Network Performance with MikroTik FastTrack in RouterOS 7 | October 27, 2025
Network administrators often face the challenge of balancing speed and stability. MikroTik’s FastTrack feature, introduced in earlier RouterOS versions and optimized in RouterOS 7, is a game-changing solution that dramatically enhances performance by reducing CPU load and improving packet handling efficiency. 🚀 What Is MikroTik FastTrack? FastTrack is a special processing method in RouterOS that allows packets from established and related connections to bypass the standard connection tracking process. In simple terms, once a connection is identified as safe and [...]
- »
MikroTik Site to Site VPN with L2TP/IPsec | March 3, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]
- »
FreeRADIUS User Group Management with MySQL | January 3, 2019
FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to [...]
- »
How to Block VPN Access with MikroTik Router | May 14, 2019
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]
- »
OpenVPN Client Configuration in Windows 10/11 | June 29, 2022
OpenVPN is an excellent VPN solution for transmitting data securely over public network. Configuring an OpenVPN Server either on MikroTik RouterOS or Ubuntu Server, we can access local servers or devices from remote place using Windows 10/11, Android or MacOS. How to configure OpenVPN Server in Ubuntu Server was discussed in the previous article. In that article, I also discussed how to create a new OpenVPN client (for Windows OS) who will be able to connect the OpenVPN Server. So, [...]
- »
Why ISPs Should Embrace TR-069 ACS to Stay Ahead of Competitors | May 22, 2023
As the telecommunications industry becomes more competitive, local ISPs need to find ways to stay ahead of larger telcos and offer services that meet the changing demands of their customers. One of the solutions to this challenge is to implement TR-069 ACS server to help streamline network management, reduce costs, and increase efficiency. In this article, we’ll explore why the TR-069 ACS server is essential for medium-sized ISPs to stay competitive in today’s market. We’ll examine the challenges these ISPs [...]
- »
MikroTik Hotspot HTTPS Redirect with Free SSL Certificate | June 21, 2020
SSL Certificate is required to enable HTTPS Login and HTTPS Redirect in MikroTik Hotspot. In one of my last articles I discussed how to configure MikroTik Hotspot HTTPS redirect and HTTPS login with MikroTik self-signed certificate. But self-signed certificate is not trusted by operating system. So, we get the following two issues if we configure HTTPS Login and HTTPS Redirect with self-signed certificate. Ask to proceed unsafe site: As browsers cannot trust self-signed certificate, it shows a warning message and [...]
You May Also Like