Chip123 科技應用創新平台

標題: 8/15、16「計算機網路-開放源碼導向」短期課程 [打印本頁]

作者: mister_liu    時間: 2011-8-2 02:08 PM
標題: 8/15、16「計算機網路-開放源碼導向」短期課程
為何通訊協定是以這種特殊方式設計而成的背後原因比通訊協定如何運作來得更重要,本課程將解釋協定的行為,並同時傳達關鍵概念和基層原理。為了進一步彌補設計和實作之間長久以來的落差,以Linux系統為例,說明了在系統裡何處以及如何實作通訊協定的設計。透過一組全方面且實際運作中的56個開放源程式碼之實作,其範圍橫跨了硬體(8B/10B、OFDM、CRC32、CSMA/CD及crypto)、驅動程式(Ethernet和PPP)、系統核心(Longest Prefix Matching、Checksum和、NAT、TCP Congestion Control、socket、shaper、scheduler、firewall及VPN)以及Daemon(RIP/OSPF/BGP、DNS、FTP、SMTP/POP3/IMAP4、HTTP、SNMP、SIP、streaming、及P2P)。本課程將計算機網路原48小時課程濃縮於兩天12小時,特別適合網路產業之研發工程師或資訊電機相關科系有基礎網路概念的學生。
6 d1 Q' @' C/ |. N7 Y/ |: t! m  B( u) ]1 L
師資:林盈達教授 /交通大學資訊工程系教授
. s  S( S% D: l  O) W/ G, ]5 u8 }課程時間與地點:100年8月15日、16日上午9時至下午4時於淡江大學台北校園(台北市大安區金華街199巷5號,近永康街
2 r( ^9 K4 }& P- L4 Y) O1 S) A報名方式:2 _7 A1 G' g" `
1.     線上註冊http://www2.tku.edu.tw/~fa/online.htm
2 C4 G. t: O& S# ]6 x2.     學費及繳費:2,600元(含補充講義200元;不含教科書費)
! V" V! \0 T3 M& a! B        ATM或匯款:戶名:財團法人私立淡江大學,帳號:第一銀行信義分行162-10-004528。
8 a2 H" G# Z$ P# u0 p3.     前述1、2項均完成方為報名完成。
; _; Q! F" ~( Y; C* G+ _! U- ?* _% Y6 \0 d9 M  u! N7 {: R
招收名額:: j' ]0 ]! C0 z% f9 h2 J
●實體班名額50名:傳統面授課程。% ^0 x- ~/ D( t, p& k6 B, Z# Q  P
●如無法配合上課地點請選:同步即時網路班名額150名:網路線上即時授課。
# @& p3 }+ j/ L●如無法配合上課時間請選:非同步網路班名額300名:100年8月18日至9月2日任何時間均可。( o, ?8 E' M1 ]; {% {% Y, E" q" C
教科書:Computer Networks: An Open Source Approach. 開發圖書,訂價1,050元﹝團購九折﹞。自由購買。8 l) R; Y  N# u- ?! B
證書:完成課程且出席率達三分之二者,發給推廣教育證明書。
作者: mister_liu    時間: 2011-8-2 02:09 PM
課程大綱:
- f+ w) `0 X2 h, l' }
1 Fundamentals
1 _/ e5 l  v+ o* h0 }1 B; S/ M1.1 Requirements of Networking , c, Q# L: g- K, h4 y
1.2 Underlying Principles
" M4 L( H6 a- D3 [# i2 O0 h1.3 The Internet Architecture
  K; q1 \7 A8 w& L; @1.4 Open Source Implementations 6 C+ r% L8 @9 I+ T5 G; I
1.5 Book Roadmap: A Packet’s Life * Z/ N- N0 J5 |8 e% i: v
Appendix B Linux Kernel Overview
+ U* L4 r) U5 N+ e# o1 wB.1 Kernel Source Tree
/ b7 Y& C- Q- S9 |7 y' _) p$ kB.2 Source Code of Networking
' \6 C* \" c* o5 E& pB.3 Tools for Source Code Tracing
  z/ R. L( f2 L8 V! P% uAppendix C Development Tools * A- b4 k7 m" S# q+ a4 Z" ?: E& Q7 Y/ a
C.1 Programming
1 d; U, v- G: G( a( P. \9 j; f% j3 QC.2 Debugging 7 X# g! }; f1 R5 f, W9 D
C.3 Maintaining $ b- z: c" }' B( m; ^
C.4 Profiling
; [" R+ U. ?& \& [( @C.5 Embedding
: k  @+ k2 j7 b# s# J6 @8 mAppendix D Network Utilities " c( q/ B6 M1 b. }, a8 r
D.1 Name-Addressing
2 k' q; n" n; C" B( H' V1 UD.2 Perimeter-Probing
0 T/ }) G9 F4 N. |D.3 Traffic-Monitoring + Y: G" P, u: R9 t7 @! m
D.4 Benchmarking ( m  y0 B9 d6 f: C1 D/ o
D.5 Simulation and Emulation 6 H$ K+ }% W) O( Q# O$ k" M
D.6 Hacking
- K8 D8 K5 d6 w3 W2 Physical Layer / Y/ M/ E1 i8 C  T# g) G3 X
General Issues ' X' W- u# Z& l3 N+ Y9 b1 t$ Y* R
Open Source Implementation 2.1: 8B/10B Encoder
% }& y8 B2 X- K' @Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM / l: d. l, G4 p
3 Link Layer
6 H: m# w3 K  c+ S1 JGeneral Issues ; E0 F+ i" O+ r: |
Open Source Implementation 3.1: Checksum + L+ A4 o2 R- M8 T( b- \* R2 b3 ]
Open Source Implementation 3.2: Hardware CRC32
3 A' S5 _6 R) q/ m0 \" ^Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs
' p; W; s9 U! L1 ^7 }Open Source Implementation 3.4: PPP
) S9 t$ O4 R- q6 O( HOpen Source Implementation 3.5: CSMA/CD / N, `0 _3 H; s- S3 T! e" Q
Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2
2 k1 U! x# }) ~. l& P4 aOpen Source Implementation 3.7: Self-Learning Bridging 0 k( y2 e# x2 ?. l6 O7 _
Open Source Implementation 3.8: Spanning Tree 3 e) \8 Y, B( {9 ?' l; B5 ]
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA ' R! `1 B: t* q1 d) {
Open Source Implementation 3.10: The Network Device Driver in Linux
  C5 K1 `9 f6 M- j' z  W4 Internet Protocol Layer : h. F) L6 \4 j  a- ^& P
General Issues
1 c" |- a! D4 X1 {Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs
* Q- i; a- T  w( \Open Source Implementation 4.2: IPv4 Packet Forwarding ; u# i+ t& n# n
Open Source Implementation 4.3: IPv4 Checksum in Assembly ! C' ]) B) ^. j: K- l
Open Source Implementation 4.4: IPv4 Fragmentation % y2 g2 g* k8 i& ^* z
Open Source Implementation 4.5: NAT
" e* J, k5 A" V1 U2 |0 g! w/ tOpen Source Implementation 4.6: ARP
9 U/ i  y8 s  C; o, Q8 w; DOpen Source Implementation 4.7: DHCP ; @2 j# X! r: e1 W0 H# ~
Open Source Implementation 4.8: ICMP
8 U# x' T3 R* b4 B" p. ?& fOpen Source Implementation 4.9: RIP 8 `5 n" u/ \: I9 Z& M$ o$ u! P& f1 L
Open Source Implementation 4.10: OSPF
( m7 g  A# \) COpen Source Implementation 4.11: BGP
1 P2 s# c3 Q, \) D6 `0 G. P: x9 dOpen Source Implementation 4.12: Mrouted
# }$ r9 K5 ]! n0 p  g: m  b5 Transport Layer
# S! j9 g" f+ R8 h; r+ Q9 R" DGeneral Issues
1 ~! V/ f2 w0 k# Q/ d+ kOpen Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs - a' @8 g* ~& Y( ^& p
Open Source Implementation 5.2: UDP and TCP Checksum   g2 W' A( T0 ^; m& M4 X1 q; E
Open Source Implementation 5.3: TCP Sliding Window Flow Control
5 D& ]0 {0 I* l' ~; e, p4 HOpen Source Implementation 5.4: TCP Slow Start and Congestion Avoidance
4 K/ m. k5 z) xOpen Source Implementation 5.5: TCP Retransmit Timer ) j- Z6 A- A( F; y
Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer
* Z& ^, W! H1 v( JOpen Source Implementation 5.7: Socket Read/Write Inside out
$ ~3 W2 D- a! h1 tOpen Source Implementation 5.8: Bypassing the Transport Layer
: b8 I2 Z% m' u+ T( d2 mOpen Source Implementation 5.9: Making Myself Promiscuous ( {" t, r# z  A- e( T
Open Source Implementation 5.10: Linux Socket Filter
4 P# Y' }" k* P6 Application Layer 4 e4 L' ]8 ^6 R
General Issues
2 V4 }  j1 Y/ N" V4 [Open Source Implementation 6.1: BIND # U8 u, ^3 `. `( @; |! v& W& d
Open Source Implementation 6.2: qmail - q& x/ y! Y- a3 t$ V+ e, |
Open Source Implementation 6.3: Apache
$ V( w& z- ]: A0 v& x) m" Y& q& EOpen Source Implementation 6.4: wu-ftpd
# l; [' Y* ^) s( T% V: S, N( b) P& gOpen Source Implementation 6.5: Net-SNMP - B8 }  f0 H- D5 e9 [
Open Source Implementation 6.6: Asterisk
. x1 D" u# c( H0 Z1 Y9 QOpen Source Implementation 6.7: Darwin * A5 _5 ~/ S! G7 v8 X7 p: X
Open Source Implementation 6.8: BitTorrent " _7 D0 H6 }7 S9 h
7 Internet QoS
$ Q1 u' N7 M- W/ I3 N: [! dGeneral Issues
, V% z: P. i1 _8 U( u3 `, MOpen Source Implementation 7.1: Traffic Control Elements in Linux 9 I3 f: f9 ~& y" B. R. W) Y
Open Source Implementation 7.2: Traffic Estimator
% |* h2 R/ l& sOpen Source Implementation 7.3: Flow Identification
, p* H- j4 ~. K- aOpen Source Implementation 7.4: Token Bucket
+ }9 X; k3 M( W5 sOpen Source Implementation 7.5: Packet Scheduling
0 D8 G* @/ v7 U$ B5 lOpen Source Implementation 7.6: Random Early Detection (RED)
4 o4 t" |9 \* L6 J% O$ T8 Network Security
  J9 ^# X7 D; p/ N; XGeneral Issues + ~* s) Q: e8 |, X
Open Source Implementation 8.1: Hardware 3DES % I9 b6 d) w' K/ A5 O* t
Open Source Implementation 8.2: MD5 ( Q0 k. L% U% E) B( W% j
Open Source Implementation 8.3: AH and ESP in IPSec   l$ J0 d& }3 z+ ^
Open Source Implementation 8.4: Netfilter and iptables
, e1 y( Q; P7 K3 H4 b* zOpen Source Implementation 8.5: FireWall Toolkit (FWTK) , e. [/ z; u+ V- ?, b0 ~
Open Source Implementation 8.6: ClamAV ' \' E7 t2 H1 S" D% m4 u* O' v2 c
Open Source Implementation 8.7: Snort 7 x: \# ~/ ^' v" s$ c- n$ ^
Open Source Implementation 8.8: SpamAssassin
- l2 p# h% M  L. L) b8 m
2小時
1 q4 Z6 T, z; |% C# m- t, u' W3 _& t4 g
# z5 e. n" y5 e/ e$ _  x

5 d9 P& D- L1 Z3 j; j! Q6 H$ u6 _" i0 J
, @' _- M6 D+ C
0.5小時 + t2 J4 y0 ]" f; T4 n' M6 p
9 w- \8 V. h& u  E
) @6 ~$ @& ]. k( z' C, N

, M% o0 |) Z7 _0.25小時
  |$ ]* C0 K2 p/ T: {/ J! D5 x, E: ^8 }5 E% G7 Z1 c+ O% O' z

, C6 E1 F( ^* G3 W& \% u! J8 r- n$ ^5 Y* u' w3 |

2 b* ?1 K2 x- B
7 J2 |/ l  z7 S- E, Z0.25小時
# m. x/ z/ B' h- P( a' n' g) ]6 L; o0 B! Q: t
! {* A3 @8 H, N" ^8 B

! W- ~$ s) S+ J  v  C3 \, y$ ?/ t  c- c. r6 w9 N) {0 d) U2 U

" M( \) S6 N# f, c$ d! ]; T$ T/ n# X6 X
0.5小時 ) r5 }% \" p6 q
2 c- t6 G# v7 ^! a+ i, c' i! f+ u

+ O9 b$ U2 B7 ?* S; J
8 J0 _7 w$ e% a. e' O1小時 % y; U. c, c  t# v  u2 w( U

, Y$ h6 }0 H' p6 N7 Q8 Q
7 _; \: k& k+ V/ f1 f9 ^/ [2 {1 h, H* o* V  C  D
+ x- y% C$ M8 [% M5 _

% |" R1 |' y3 l; ]2 j- T$ H$ J1 Y$ `9 F# l

$ Y# W8 J. l3 e' F) h: K6 U9 e0 b6 W+ `& a# B

8 s7 ^# f; ?+ o) [! }
2 V  ^' D0 t" y; z4 W* ~% r5 e: |, |+ O+ ?+ z
4 Q- W. I  Y/ L
1.5小時 3 z. b8 |& u. W+ Y$ ~0 S7 e4 S

4 t4 `5 b' B5 e' G/ R. \/ x2 E1 V, U) v5 M$ X8 m

% W7 j% ]1 @, ^& S, l' Y. Q+ z9 P4 V% m! d0 h* [; }
' ?( C# f0 V2 [
  i' p- L$ G1 v8 s
! L& B( c+ L5 x

$ |+ y% f1 P  X, @3 d
& N; u1 H7 }: C2 M* D& \- D% E* H
. N2 O, x+ X& u* c+ P# \: p+ V6 ]

- S5 Q7 Z/ |) i. l4 B* ?6 H0 T: S: U4 E8 x
1小時 2 \# r; D3 P; x/ C) b

/ z6 ~9 f! a! t$ A4 k6 t# o# W+ m8 H7 N/ u
7 ]# ]3 S2 I; N3 m& y+ I' T

) n2 a# P+ k+ t9 t9 d; K0 k) B. ~9 f& u( F
9 ?$ U  D$ Y0 @5 C: y

* m' x% Y1 W. c  f, D/ N  {1 l+ I6 Z4 [& ]3 l2 k3 H% p2 Q

/ d. j. }0 p: D* _/ s! o, V
: ?( q9 \5 r: R
$ S" g3 V5 P4 Z9 S& v( f
4 c; W. L5 u0 K3 k2 I1 S9 E, Y2小時 - L# m6 A9 u2 k; w9 V

. I, ^! M" o. ^6 q8 `, f3 P
5 h7 Z8 m" J% C- m+ x7 s3 n! d2 B' G  B8 B8 \& g

3 I! v! ^/ a) i/ L5 @/ Z% J2 O6 a3 [  [- K! H2 T% u6 S; A* x
. F$ ^1 i/ D8 A; }) T6 r

! t5 }2 k( E) i
' S- d( z* l# _1 p$ X. ~& x! r& e. T5 ?$ H6 S
1小時 ! y: Y: {1 C) @/ ?

- Y% H* L" u( z, q( n
/ R6 P- s/ u# R- u- j& `3 k2 Z% K
- f( `/ X6 E4 w0 b
, r& k- h8 o: V( T, T, z; k3 G  \; F

. _  ^( o' H: a; x
. J3 c/ L5 b- o4 j9 h6 M2小時
3 E4 K8 L; Z9 K# E3 f8 r7 V1 Z0 ^7 z  f0 q  |2 |





歡迎光臨 Chip123 科技應用創新平台 (http://chip123.com/) Powered by Discuz! X3.2