1 Fundamentals 1.1 Requirements of Networking 2 T X/ L7 f# @; ^/ @( o# K 1.2 Underlying Principles ; T9 v% G, J% ?+ {. ^ 1.3 The Internet Architecture 1.4 Open Source Implementations 1.5 Book Roadmap: A Packet’s Life . C; M0 s+ t# j! d Appendix B Linux Kernel Overview B.1 Kernel Source Tree B.2 Source Code of Networking 7 m1 |- i+ _; `# @7 a4 ^2 I B.3 Tools for Source Code Tracing Appendix C Development Tools C.1 Programming C.2 Debugging C.3 Maintaining 3 a5 Q' l, m! g2 e, [. R% d C.4 Profiling , s4 N8 M" B+ d- {! E C.5 Embedding 0 L# ~: \5 K) c! ] Appendix D Network Utilities 6 J9 N' W/ q( D5 b7 y! F D.1 Name-Addressing $ P5 F% [/ g/ U% f; o; I2 Z D.2 Perimeter-Probing D.3 Traffic-Monitoring % D3 E1 z7 d' v( ?, P' O D.4 Benchmarking $ Z, X! J& R# M1 g2 G) A+ }# R w' ? D.5 Simulation and Emulation D.6 Hacking 2 Physical Layer General Issues Open Source Implementation 2.1: 8B/10B Encoder ! N7 \) N! y2 i- p5 r Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM 3 Link Layer General Issues ' X5 U4 }. a2 [: h; q8 ` Open Source Implementation 3.1: Checksum Open Source Implementation 3.2: Hardware CRC32 ; z8 s! n. b4 I# c% M Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs + Q; ~& B. F9 B) ~$ J2 A) | Open Source Implementation 3.4: PPP % n! ~, ?5 J$ C4 N Open Source Implementation 3.5: CSMA/CD Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 Open Source Implementation 3.7: Self-Learning Bridging % g! c" ^& e, E; ~4 R) M6 I1 t" B Open Source Implementation 3.8: Spanning Tree 5 ]2 @" e- Y$ R0 T f6 D Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA 6 S* _1 d5 y# e; p1 c* Z% ]$ ^ V' t1 H Open Source Implementation 3.10: The Network Device Driver in Linux 4 Internet Protocol Layer General Issues Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs - _0 M. y; s" T( G' `: [ Open Source Implementation 4.2: IPv4 Packet Forwarding , U6 [* R# q9 ] Open Source Implementation 4.3: IPv4 Checksum in Assembly Open Source Implementation 4.4: IPv4 Fragmentation Open Source Implementation 4.5: NAT * B4 y' B5 a. ^ _8 o% g- y8 N Open Source Implementation 4.6: ARP 4 T7 _2 z$ z' j) H: v8 ~ Open Source Implementation 4.7: DHCP Open Source Implementation 4.8: ICMP Open Source Implementation 4.9: RIP Open Source Implementation 4.10: OSPF , c, T; t5 K# s4 X5 d' h" r Open Source Implementation 4.11: BGP 2 Z) L. a( r" [3 u Open Source Implementation 4.12: Mrouted 5 Transport Layer General Issues . a* A$ p2 ^3 O/ S0 ]) | Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs Open Source Implementation 5.2: UDP and TCP Checksum . O; {8 F7 O4 }5 }8 P2 q Open Source Implementation 5.3: TCP Sliding Window Flow Control Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance 6 h1 L Z$ H) w, o% P4 C Open Source Implementation 5.5: TCP Retransmit Timer Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer % W- k7 g" ~* C4 Y* L Open Source Implementation 5.7: Socket Read/Write Inside out Open Source Implementation 5.8: Bypassing the Transport Layer + l5 Z/ E1 ^) a Open Source Implementation 5.9: Making Myself Promiscuous Open Source Implementation 5.10: Linux Socket Filter 2 `) ]" c9 v% w) }7 w 6 Application Layer General Issues Open Source Implementation 6.1: BIND 9 v% N$ z% Q/ o% H Open Source Implementation 6.2: qmail * J# K1 ~+ U6 `/ r) o5 ^ Open Source Implementation 6.3: Apache Open Source Implementation 6.4: wu-ftpd , s7 j: U6 k3 ?2 _ Open Source Implementation 6.5: Net-SNMP Open Source Implementation 6.6: Asterisk Open Source Implementation 6.7: Darwin # r) i, b$ |6 Y; R* q5 a( n Open Source Implementation 6.8: BitTorrent : {% L* n- @+ O/ g 7 Internet QoS 5 G6 c( b5 O/ ]' `5 z. @3 [% n General Issues ' l( j0 f3 y) I4 R! W7 m Open Source Implementation 7.1: Traffic Control Elements in Linux Open Source Implementation 7.2: Traffic Estimator / \7 O- \( T5 z5 _ Open Source Implementation 7.3: Flow Identification 7 @5 @! j2 L9 Z% ] Open Source Implementation 7.4: Token Bucket Open Source Implementation 7.5: Packet Scheduling Open Source Implementation 7.6: Random Early Detection (RED) 8 Network Security General Issues Open Source Implementation 8.1: Hardware 3DES & D G3 i2 W" H Open Source Implementation 8.2: MD5 6 t q) \6 `2 l0 k. K+ W& u Open Source Implementation 8.3: AH and ESP in IPSec Open Source Implementation 8.4: Netfilter and iptables Open Source Implementation 8.5: FireWall Toolkit (FWTK) ( V( I: b8 j3 a$ I, [ Open Source Implementation 8.6: ClamAV Open Source Implementation 8.7: Snort Open Source Implementation 8.8: SpamAssassin | 2小時 & h2 \. w) J; e& C# w $ i, i0 @$ k1 B% c }5 q : t7 Z3 k9 U0 y" X% A1 S2 Q4 ~* Q % S m& ^1 |! t- F* l 7 C1 }! z) a; R0 Y# z3 W 0.5小時 1 r+ w+ Q4 K0 O/ r; a : z1 C5 N) \$ J; ]/ ~- P " F$ y) R; a7 a+ T3 v 0.25小時 * p: x, j4 E& t- `1 A5 `9 |4 U8 j( \ 0.25小時 & l; q/ `4 b) U 0.5小時 2 G9 J2 o( L# M; X) W! u, Z/ ` 1小時 : j: `6 d t8 t, [* D) |) H - ^1 ^" g" s" I. J 5 q$ u/ T9 ?6 \3 S! `3 z1 Z+ { 1 {3 e9 s# _) _2 t 5 E! D6 Z. {/ \$ C6 i 7 a4 H2 @7 { \! S4 W: P 1.5小時 9 J$ V( m1 g& c, Q/ F2 D1 d % M$ Y- \# v3 A ! r& o7 X- ~* z8 c5 h ) T; F" s ~& A" @2 N 9 _# P% y: t% s7 @& \0 h# h& v 1小時 ' I4 R3 j: g6 r/ o+ e 1 c6 T% F4 w% \- |/ ^ ' z7 f% b4 A0 p1 x/ O9 {9 f* e5 U2 V " t9 a9 y# l; p2 M5 \2 F# x( c % {0 T2 I$ O6 n+ R( U + L: Q; ^4 b) I9 i, G7 V 2 K$ y j$ Q V$ \4 l ' C" T( R: n7 I4 ~+ k: k 2小時 4 F. j; t! ^7 D+ F5 | * s3 z0 j3 Y; A $ m4 v! w$ ?! N; s 0 B, d5 ]; R, C" V( f; d 1小時 , ~$ L/ n2 q L' ~9 Q% N7 B( S - ^" b9 U5 E( Q/ i% y ; U$ H: G+ J5 |' D- _ u4 J 6 n( W. o) e( i) r $ S, C% h5 X! e+ P4 k8 U. v . r7 j1 m& _' E! o& } 2小時 |
歡迎光臨 Chip123 科技應用創新平台 (http://chip123.com/) | Powered by Discuz! X3.2 |