1 Fundamentals 1.1 Requirements of Networking , c, Q# L: g- K, h4 y 1.2 Underlying Principles 1.3 The Internet Architecture 1.4 Open Source Implementations 6 C+ r% L8 @9 I+ T5 G; I 1.5 Book Roadmap: A Packet’s Life * Z/ N- N0 J5 |8 e% i: v Appendix B Linux Kernel Overview B.1 Kernel Source Tree B.2 Source Code of Networking B.3 Tools for Source Code Tracing Appendix C Development Tools * A- b4 k7 m" S# q+ a4 Z" ?: E& Q7 Y/ a C.1 Programming C.2 Debugging 7 X# g! }; f1 R5 f, W9 D C.3 Maintaining $ b- z: c" }' B( m; ^ C.4 Profiling C.5 Embedding Appendix D Network Utilities " c( q/ B6 M1 b. }, a8 r D.1 Name-Addressing D.2 Perimeter-Probing D.3 Traffic-Monitoring + Y: G" P, u: R9 t7 @! m D.4 Benchmarking ( m y0 B9 d6 f: C1 D/ o D.5 Simulation and Emulation 6 H$ K+ }% W) O( Q# O$ k" M D.6 Hacking 2 Physical Layer / Y/ M/ E1 i8 C T# g) G3 X General Issues ' X' W- u# Z& l3 N+ Y9 b1 t$ Y* R Open Source Implementation 2.1: 8B/10B Encoder Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM / l: d. l, G4 p 3 Link Layer General Issues ; E0 F+ i" O+ r: | Open Source Implementation 3.1: Checksum + L+ A4 o2 R- M8 T( b- \* R2 b3 ] Open Source Implementation 3.2: Hardware CRC32 Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs Open Source Implementation 3.4: PPP Open Source Implementation 3.5: CSMA/CD / N, `0 _3 H; s- S3 T! e" Q Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 Open Source Implementation 3.7: Self-Learning Bridging 0 k( y2 e# x2 ?. l6 O7 _ Open Source Implementation 3.8: Spanning Tree 3 e) \8 Y, B( {9 ?' l; B5 ] Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA ' R! `1 B: t* q1 d) { Open Source Implementation 3.10: The Network Device Driver in Linux 4 Internet Protocol Layer : h. F) L6 \4 j a- ^& P General Issues Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs Open Source Implementation 4.2: IPv4 Packet Forwarding ; u# i+ t& n# n Open Source Implementation 4.3: IPv4 Checksum in Assembly ! C' ]) B) ^. j: K- l Open Source Implementation 4.4: IPv4 Fragmentation % y2 g2 g* k8 i& ^* z Open Source Implementation 4.5: NAT Open Source Implementation 4.6: ARP Open Source Implementation 4.7: DHCP ; @2 j# X! r: e1 W0 H# ~ Open Source Implementation 4.8: ICMP Open Source Implementation 4.9: RIP 8 `5 n" u/ \: I9 Z& M$ o$ u! P& f1 L Open Source Implementation 4.10: OSPF Open Source Implementation 4.11: BGP Open Source Implementation 4.12: Mrouted 5 Transport Layer General Issues Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs - a' @8 g* ~& Y( ^& p Open Source Implementation 5.2: UDP and TCP Checksum g2 W' A( T0 ^; m& M4 X1 q; E Open Source Implementation 5.3: TCP Sliding Window Flow Control Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance Open Source Implementation 5.5: TCP Retransmit Timer ) j- Z6 A- A( F; y Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer Open Source Implementation 5.7: Socket Read/Write Inside out Open Source Implementation 5.8: Bypassing the Transport Layer Open Source Implementation 5.9: Making Myself Promiscuous ( {" t, r# z A- e( T Open Source Implementation 5.10: Linux Socket Filter 6 Application Layer 4 e4 L' ]8 ^6 R General Issues Open Source Implementation 6.1: BIND # U8 u, ^3 `. `( @; |! v& W& d Open Source Implementation 6.2: qmail - q& x/ y! Y- a3 t$ V+ e, | Open Source Implementation 6.3: Apache Open Source Implementation 6.4: wu-ftpd Open Source Implementation 6.5: Net-SNMP - B8 } f0 H- D5 e9 [ Open Source Implementation 6.6: Asterisk Open Source Implementation 6.7: Darwin * A5 _5 ~/ S! G7 v8 X7 p: X Open Source Implementation 6.8: BitTorrent " _7 D0 H6 }7 S9 h 7 Internet QoS General Issues Open Source Implementation 7.1: Traffic Control Elements in Linux 9 I3 f: f9 ~& y" B. R. W) Y Open Source Implementation 7.2: Traffic Estimator Open Source Implementation 7.3: Flow Identification Open Source Implementation 7.4: Token Bucket Open Source Implementation 7.5: Packet Scheduling Open Source Implementation 7.6: Random Early Detection (RED) 8 Network Security General Issues + ~* s) Q: e8 |, X Open Source Implementation 8.1: Hardware 3DES % I9 b6 d) w' K/ A5 O* t Open Source Implementation 8.2: MD5 ( Q0 k. L% U% E) B( W% j Open Source Implementation 8.3: AH and ESP in IPSec l$ J0 d& }3 z+ ^ Open Source Implementation 8.4: Netfilter and iptables Open Source Implementation 8.5: FireWall Toolkit (FWTK) , e. [/ z; u+ V- ?, b0 ~ Open Source Implementation 8.6: ClamAV ' \' E7 t2 H1 S" D% m4 u* O' v2 c Open Source Implementation 8.7: Snort 7 x: \# ~/ ^' v" s$ c- n$ ^ Open Source Implementation 8.8: SpamAssassin | 2小時 % C# m- t, u' W3 _& t4 g # z5 e. n" y5 e/ e$ _ x ! Q6 H$ u6 _" i0 J , @' _- M6 D+ C 0.5小時 + t2 J4 y0 ]" f; T4 n' M6 p 9 w- \8 V. h& u E ) @6 ~$ @& ]. k( z' C, N 0.25小時 : ^8 }5 E% G7 Z1 c+ O% O' z & \% u! J8 r- n$ ^5 Y* u' w3 | 0.25小時 ) ]6 L; o0 B! Q: t ! {* A3 @8 H, N" ^8 B , y$ ?/ t c- c. r6 w9 N) {0 d) U2 U , c$ d! ]; T$ T/ n# X6 X 0.5小時 ) r5 }% \" p6 q 2 c- t6 G# v7 ^! a+ i, c' i! f+ u 1小時 % y; U. c, c t# v u2 w( U 9 ^/ [2 {1 h, H* o* V C D + x- y% C$ M8 [% M5 _ - T$ H$ J1 Y$ `9 F# l ) h: K6 U9 e0 b6 W+ `& a# B : |, |+ O+ ?+ z 4 Q- W. I Y/ L 1.5小時 3 z. b8 |& u. W+ Y$ ~0 S7 e4 S 2 E1 V, U) v5 M$ X8 m ' Y. Q+ z9 P4 V% m! d0 h* [; } ' ?( C# f0 V2 [ i' p- L$ G1 v8 s ! L& B( c+ L5 x * D& \- D% E* H . N2 O, x+ X& u* c+ P# \: p+ V6 ] * ?6 H0 T: S: U4 E8 x 1小時 2 \# r; D3 P; x/ C) b # o# W+ m8 H7 N/ u 7 ]# ]3 S2 I; N3 m& y+ I' T 0 k) B. ~9 f& u( F 9 ?$ U D$ Y0 @5 C: y {1 l+ I6 Z4 [& ]3 l2 k3 H% p2 Q 2小時 - L# m6 A9 u2 k; w9 V 7 s3 n! d2 B' G B8 B8 \& g 5 @/ Z% J2 O6 a3 [ [- K! H2 T% u6 S; A* x . F$ ^1 i/ D8 A; }) T6 r & x! r& e. T5 ?$ H6 S 1小時 ! y: Y: {1 C) @/ ? , T, z; k3 G \; F 2小時 3 f8 r7 V1 Z0 ^7 z f0 q |2 | |
歡迎光臨 Chip123 科技應用創新平台 (http://chip123.com/) | Powered by Discuz! X3.2 |