Chip123 科技應用創新平台

標題: 8/15、16「計算機網路-開放源碼導向」短期課程 [打印本頁]

作者: mister_liu    時間: 2011-8-2 02:08 PM
標題: 8/15、16「計算機網路-開放源碼導向」短期課程
為何通訊協定是以這種特殊方式設計而成的背後原因比通訊協定如何運作來得更重要,本課程將解釋協定的行為,並同時傳達關鍵概念和基層原理。為了進一步彌補設計和實作之間長久以來的落差,以Linux系統為例,說明了在系統裡何處以及如何實作通訊協定的設計。透過一組全方面且實際運作中的56個開放源程式碼之實作,其範圍橫跨了硬體(8B/10B、OFDM、CRC32、CSMA/CD及crypto)、驅動程式(Ethernet和PPP)、系統核心(Longest Prefix Matching、Checksum和、NAT、TCP Congestion Control、socket、shaper、scheduler、firewall及VPN)以及Daemon(RIP/OSPF/BGP、DNS、FTP、SMTP/POP3/IMAP4、HTTP、SNMP、SIP、streaming、及P2P)。本課程將計算機網路原48小時課程濃縮於兩天12小時,特別適合網路產業之研發工程師或資訊電機相關科系有基礎網路概念的學生。
2 l6 \% T0 T: t5 t! J! z7 T7 U  J3 O8 |
師資:林盈達教授 /交通大學資訊工程系教授( M# |, l, K: E+ m$ i$ p; m2 r
課程時間與地點:100年8月15日、16日上午9時至下午4時於淡江大學台北校園(台北市大安區金華街199巷5號,近永康街6 q2 d& @, _2 i( d; _
報名方式:% J7 ?9 w# k" ^7 P
1.     線上註冊http://www2.tku.edu.tw/~fa/online.htm
- h! I4 Q) y1 W  u' _2.     學費及繳費:2,600元(含補充講義200元;不含教科書費)
6 z  R* s- L, e+ E: y6 D4 g1 G        ATM或匯款:戶名:財團法人私立淡江大學,帳號:第一銀行信義分行162-10-004528。2 y9 x; H4 t9 o8 Q
3.     前述1、2項均完成方為報名完成。5 R+ Q5 V8 ]$ m/ v8 |8 a" N$ P
% ?/ b% _/ V: M7 m& O8 [9 l. e
招收名額:
7 A+ E& y# T9 }( r( B$ j●實體班名額50名:傳統面授課程。* k" F6 T6 O, G' `8 H$ l6 w8 f
●如無法配合上課地點請選:同步即時網路班名額150名:網路線上即時授課。* [, P9 ?3 W1 O7 ?) ]$ b6 R
●如無法配合上課時間請選:非同步網路班名額300名:100年8月18日至9月2日任何時間均可。+ w% X, p+ L: }: s
教科書:Computer Networks: An Open Source Approach. 開發圖書,訂價1,050元﹝團購九折﹞。自由購買。
$ b' _5 q; g; q- J2 a9 h7 W% `% g證書:完成課程且出席率達三分之二者,發給推廣教育證明書。
作者: mister_liu    時間: 2011-8-2 02:09 PM
課程大綱:
8 Y! r! ]+ `7 R! {
1 Fundamentals
9 e9 ^: Y  T. r0 }: P, q: |1 V$ f1.1 Requirements of Networking 2 T  X/ L7 f# @; ^/ @( o# K
1.2 Underlying Principles ; T9 v% G, J% ?+ {. ^
1.3 The Internet Architecture
/ Z8 ]. h  b. V. a1.4 Open Source Implementations
% w+ W" {4 u# G; H2 ?0 u1.5 Book Roadmap: A Packet’s Life . C; M0 s+ t# j! d
Appendix B Linux Kernel Overview
' h+ q; G0 L. o+ x9 J) I( C. c# qB.1 Kernel Source Tree
7 S! |6 z$ z/ E4 U0 Y6 OB.2 Source Code of Networking 7 m1 |- i+ _; `# @7 a4 ^2 I
B.3 Tools for Source Code Tracing
. ^: X% c6 I8 K) F# tAppendix C Development Tools
; U# Z& L7 ?3 rC.1 Programming
4 B0 j/ \- `  B/ ]8 u$ t. s! PC.2 Debugging
: l4 J  ^5 r: k$ s8 @/ tC.3 Maintaining 3 a5 Q' l, m! g2 e, [. R% d
C.4 Profiling , s4 N8 M" B+ d- {! E
C.5 Embedding 0 L# ~: \5 K) c! ]
Appendix D Network Utilities 6 J9 N' W/ q( D5 b7 y! F
D.1 Name-Addressing $ P5 F% [/ g/ U% f; o; I2 Z
D.2 Perimeter-Probing
0 a0 V, l$ T# e# SD.3 Traffic-Monitoring % D3 E1 z7 d' v( ?, P' O
D.4 Benchmarking $ Z, X! J& R# M1 g2 G) A+ }# R  w' ?
D.5 Simulation and Emulation
0 u5 U5 [( W: W( Z" gD.6 Hacking
' k! U5 `/ a5 d0 U: N, @9 ], Q2 Physical Layer
0 P: O5 e# a5 X- I9 c6 }: Z- wGeneral Issues
! R) t) {/ `# m6 q; aOpen Source Implementation 2.1: 8B/10B Encoder ! N7 \) N! y2 i- p5 r
Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM
$ o/ q( l) H' q) v) g+ D( \  _' S3 Link Layer
0 p# }* k$ Q3 ?! F  o+ o: g( ~General Issues ' X5 U4 }. a2 [: h; q8 `
Open Source Implementation 3.1: Checksum
: T$ Q8 [: W7 q) T  eOpen Source Implementation 3.2: Hardware CRC32 ; z8 s! n. b4 I# c% M
Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs + Q; ~& B. F9 B) ~$ J2 A) |
Open Source Implementation 3.4: PPP % n! ~, ?5 J$ C4 N
Open Source Implementation 3.5: CSMA/CD
% E* ?+ H, z! [+ ?# V* ROpen Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2
8 n5 R- V2 u0 @5 Q! @Open Source Implementation 3.7: Self-Learning Bridging % g! c" ^& e, E; ~4 R) M6 I1 t" B
Open Source Implementation 3.8: Spanning Tree 5 ]2 @" e- Y$ R0 T  f6 D
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA 6 S* _1 d5 y# e; p1 c* Z% ]$ ^  V' t1 H
Open Source Implementation 3.10: The Network Device Driver in Linux
: h0 h+ l1 \+ S0 |4 Internet Protocol Layer
. y: ^- C# n* C0 z# |General Issues
$ X2 }; I( X! ~6 \4 ]! p$ P1 ^Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs - _0 M. y; s" T( G' `: [
Open Source Implementation 4.2: IPv4 Packet Forwarding , U6 [* R# q9 ]
Open Source Implementation 4.3: IPv4 Checksum in Assembly
" b2 o, c  j) x* c+ r: L$ M2 `" H) KOpen Source Implementation 4.4: IPv4 Fragmentation
/ z$ X  Q4 b% _Open Source Implementation 4.5: NAT * B4 y' B5 a. ^  _8 o% g- y8 N
Open Source Implementation 4.6: ARP 4 T7 _2 z$ z' j) H: v8 ~
Open Source Implementation 4.7: DHCP
; Z0 B8 z7 _- m, @. ~Open Source Implementation 4.8: ICMP
5 Q  `8 A8 n7 }( z& ~' g5 iOpen Source Implementation 4.9: RIP
, X% w. @' s$ v7 T, n* hOpen Source Implementation 4.10: OSPF , c, T; t5 K# s4 X5 d' h" r
Open Source Implementation 4.11: BGP 2 Z) L. a( r" [3 u
Open Source Implementation 4.12: Mrouted
6 e% u) E* X# j$ y5 Transport Layer
6 c0 V" ?' s9 x# U0 DGeneral Issues . a* A$ p2 ^3 O/ S0 ]) |
Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs
* J! g  P0 X+ X! SOpen Source Implementation 5.2: UDP and TCP Checksum . O; {8 F7 O4 }5 }8 P2 q
Open Source Implementation 5.3: TCP Sliding Window Flow Control
6 `2 ^  d" {9 I+ P% G. IOpen Source Implementation 5.4: TCP Slow Start and Congestion Avoidance 6 h1 L  Z$ H) w, o% P4 C
Open Source Implementation 5.5: TCP Retransmit Timer
: |0 J: x* ~* MOpen Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer % W- k7 g" ~* C4 Y* L
Open Source Implementation 5.7: Socket Read/Write Inside out
: O$ e8 U1 `3 K' Q8 E7 J) ^Open Source Implementation 5.8: Bypassing the Transport Layer + l5 Z/ E1 ^) a
Open Source Implementation 5.9: Making Myself Promiscuous
: S* K) o4 u" n" dOpen Source Implementation 5.10: Linux Socket Filter 2 `) ]" c9 v% w) }7 w
6 Application Layer
" F4 z, L" _" ]. Y! lGeneral Issues
7 T  T, u' k4 H+ J; }/ kOpen Source Implementation 6.1: BIND 9 v% N$ z% Q/ o% H
Open Source Implementation 6.2: qmail * J# K1 ~+ U6 `/ r) o5 ^
Open Source Implementation 6.3: Apache
/ l. @1 o, x7 v8 \- n1 J  |Open Source Implementation 6.4: wu-ftpd , s7 j: U6 k3 ?2 _
Open Source Implementation 6.5: Net-SNMP
* A% ~% y4 D  J* |! z; AOpen Source Implementation 6.6: Asterisk
: ?3 Q. r% I9 }0 `/ hOpen Source Implementation 6.7: Darwin # r) i, b$ |6 Y; R* q5 a( n
Open Source Implementation 6.8: BitTorrent : {% L* n- @+ O/ g
7 Internet QoS 5 G6 c( b5 O/ ]' `5 z. @3 [% n
General Issues ' l( j0 f3 y) I4 R! W7 m
Open Source Implementation 7.1: Traffic Control Elements in Linux
) s) T- q: B  i$ I% B/ S% TOpen Source Implementation 7.2: Traffic Estimator / \7 O- \( T5 z5 _
Open Source Implementation 7.3: Flow Identification 7 @5 @! j2 L9 Z% ]
Open Source Implementation 7.4: Token Bucket
( G9 X/ @1 N! C; q) o6 WOpen Source Implementation 7.5: Packet Scheduling
0 {' Z0 K$ I% a- [. J9 A6 mOpen Source Implementation 7.6: Random Early Detection (RED)
, f# P1 C! q9 i' `: y) g8 Network Security
; n3 N1 F4 L* j, jGeneral Issues
& i0 G& P4 [/ v: a, H; q9 SOpen Source Implementation 8.1: Hardware 3DES & D  G3 i2 W" H
Open Source Implementation 8.2: MD5 6 t  q) \6 `2 l0 k. K+ W& u
Open Source Implementation 8.3: AH and ESP in IPSec
" s5 j# V1 j( o& ?5 uOpen Source Implementation 8.4: Netfilter and iptables
4 t. z$ U8 I) ]/ oOpen Source Implementation 8.5: FireWall Toolkit (FWTK) ( V( I: b8 j3 a$ I, [
Open Source Implementation 8.6: ClamAV
; o8 |% p6 z8 i* lOpen Source Implementation 8.7: Snort
' B5 H& U& d0 A& L3 POpen Source Implementation 8.8: SpamAssassin
5 v+ `) M. q" R8 W" F! ~& Y
2小時
% c' R+ H. {4 }& h2 \. w) J; e& C# w
$ i, i0 @$ k1 B% c  }5 q
: t7 Z3 k9 U0 y" X% A1 S2 Q4 ~* Q
% S  m& ^1 |! t- F* l
7 C1 }! z) a; R0 Y# z3 W
0.5小時 1 r+ w+ Q4 K0 O/ r; a
: z1 C5 N) \$ J; ]/ ~- P

5 l  p# U# E; b; Z8 T, V* [& Z" F$ y) R; a7 a+ T3 v
0.25小時
6 ?3 R: ?  Z5 j0 N, k& R& P* p: x, j4 E& t- `1 A5 `9 |4 U8 j( \

. t& R, l# B) C2 x
0 R: ^% {; X6 J- {" {/ a
2 h0 u7 U$ U1 c  d! B: Y+ t
( U: G: I- s  _0.25小時 & l; q/ `4 b) U

& C( j8 H! h& Z. R, Y
6 @7 D. I, h& N  W4 L
& e+ w4 @( N$ q+ M+ U
; d/ ^* o0 Z' l: [" _
# ~8 b( b& l) N) ?+ y
5 O) {/ _% r% ~, h" l; s/ I" D0.5小時 2 G9 J2 o( L# M; X) W! u, Z/ `

( h4 ^& s1 t8 |1 H
- e7 ?5 U; d2 i5 P' _
8 V# ]- o% D$ O# \1小時
( n! l. s% R* g0 R* b3 e* E: j: `6 d  t8 t, [* D) |) H
- ^1 ^" g" s" I. J

6 P/ G* l! j) t3 S5 z/ |) t+ Q/ `5 q$ u/ T9 ?6 \3 S! `3 z1 Z+ {

& h. R& [/ o! U4 R1 {3 e9 s# _) _2 t

0 }2 b, N9 J8 K& t0 ^% ~' S5 E! D6 Z. {/ \$ C6 i

1 b9 B0 a) u  S( b! z6 |
; F0 a, }  r7 @# A/ z
0 c, ~# A0 C2 T' n7 a4 H2 @7 {  \! S4 W: P
1.5小時 9 J$ V( m1 g& c, Q/ F2 D1 d
% M$ Y- \# v3 A

1 t) u% e( L) {
( s4 @, e% d! D( i! r& o7 X- ~* z8 c5 h

9 T7 t! F" A( |, f) T; F" s  ~& A" @2 N

' v$ E  Y9 j" ^* M: A$ s: K
5 S3 P+ `: t" w# a. X1 \
8 I, C  {' b6 f6 ]
6 h8 `+ N! X  i; R+ P9 _# P% y: t% s7 @& \0 h# h& v

6 B5 K; G5 l8 z% [. |
; j9 L" n. M0 S, w+ O1小時 ' I4 R3 j: g6 r/ o+ e
1 c6 T% F4 w% \- |/ ^

3 T0 }5 [1 S) B2 i$ s$ b' Q" B
  ]& W1 A( j9 U0 e% C7 l' z7 f% b4 A0 p1 x/ O9 {9 f* e5 U2 V
" t9 a9 y# l; p2 M5 \2 F# x( c
% {0 T2 I$ O6 n+ R( U

) n/ c6 [& c- n2 S+ L: Q; ^4 b) I9 i, G7 V
2 K$ y  j$ Q  V$ \4 l
' C" T( R: n7 I4 ~+ k: k

+ A" j/ W2 v% L+ ?; t* K- y
/ F) o9 ?9 d7 A5 r4 _4 W2小時
( K, N% S6 d7 @4 F. j; t! ^7 D+ F5 |

) P8 C+ d' _2 I; l* s3 z0 j3 Y; A
$ m4 v! w$ ?! N; s
0 B, d5 ]; R, C" V( f; d

  q2 A' O* \: @* N* F- J
4 D$ O& _& y* I( n0 e
- n* B( E! q5 m
& a/ X8 ^! S& T5 U* z5 f& H1小時 , ~$ L/ n2 q  L' ~9 Q% N7 B( S
- ^" b9 U5 E( Q/ i% y

2 H8 R3 p5 {6 N& B6 C& q5 \; U$ H: G+ J5 |' D- _  u4 J
6 n( W. o) e( i) r
$ S, C% h5 X! e+ P4 k8 U. v
. r7 j1 m& _' E! o& }

" W. y9 B" h9 a) f& P2小時
( n0 _2 X6 I% m4 z; G
1 D, R# m+ |1 O/ p: T0 g2 r9 u





歡迎光臨 Chip123 科技應用創新平台 (http://chip123.com/) Powered by Discuz! X3.2