1 Fundamentals
' Y |4 X; A) n; s: Y$ z3 o1.1 Requirements of Networking 1 n% G# B% X" {, K X
1.2 Underlying Principles & r3 I1 ^/ B7 q. U- f1 d; t9 S
1.3 The Internet Architecture
: o- B2 s6 R, l3 C; r/ {1.4 Open Source Implementations
4 M! c# ~* Y. D. q" P& l1.5 Book Roadmap: A Packet’s Life
2 w( [* c/ G) J" G. E+ gAppendix B Linux Kernel Overview ; M5 d% Q, Y( l& ^! K* D* [) ]
B.1 Kernel Source Tree
# ^, d+ |0 u8 KB.2 Source Code of Networking
& z, @: v( m9 sB.3 Tools for Source Code Tracing * c$ E( \' V' |4 u! n# T. h! }
Appendix C Development Tools
+ e8 m' Y, Q4 V1 ^( V0 R! g, BC.1 Programming : L2 i( `( Y0 H6 ?; R% T
C.2 Debugging y: m+ Q+ i! R l# m
C.3 Maintaining ( d+ A/ p- ~3 c N
C.4 Profiling 4 z) Y5 Z; i# ^
C.5 Embedding + ~3 z1 B' L2 j* m1 |9 ~
Appendix D Network Utilities
% t, g7 G) z V" F, |D.1 Name-Addressing
) f7 `" u2 B# C9 I( i- C: j+ n' MD.2 Perimeter-Probing 6 e) W2 {# n. ]: x9 }
D.3 Traffic-Monitoring $ |7 o y# i% Z: n/ m
D.4 Benchmarking
. S6 w" a+ X( w* _) Y" mD.5 Simulation and Emulation e) n' O& @7 ]2 I$ k
D.6 Hacking
, L6 g, y# {- l, B9 D! Y2 Physical Layer 8 D, c3 B$ y. J7 R
General Issues
+ W' w/ |1 ]" c7 m1 V) Y! X+ W$ zOpen Source Implementation 2.1: 8B/10B Encoder
; j( i8 U: d" f( w# G! p1 bOpen Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM % S% T/ k& p: g1 t7 Z) i9 S X ~
3 Link Layer
1 ]2 `7 a" O" n$ l @General Issues y1 b: C0 R+ Z! q& j( e P
Open Source Implementation 3.1: Checksum 5 Z# X9 h2 P0 M4 \3 Y
Open Source Implementation 3.2: Hardware CRC32 ( i; W( K: _0 m. F' R# h& H. J* c
Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs
# P' s2 I* V I- ?Open Source Implementation 3.4: PPP 3 X g$ V+ ] y* [. \# n
Open Source Implementation 3.5: CSMA/CD
. d/ V/ @$ n' M0 f+ tOpen Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2
* l( u+ k' B& POpen Source Implementation 3.7: Self-Learning Bridging 3 y0 h$ P, U" L, V( y* k
Open Source Implementation 3.8: Spanning Tree : v/ x: _6 D8 j5 j
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA ( A# q9 B3 M5 U% O
Open Source Implementation 3.10: The Network Device Driver in Linux
2 U7 ^: t. l4 `6 k K% q. U B4 Internet Protocol Layer
) V9 ~8 J& Y+ xGeneral Issues 6 o) a, g$ ?! o% ]4 S5 c
Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs F5 R% k9 Y4 P" g' M) y/ a
Open Source Implementation 4.2: IPv4 Packet Forwarding ; h, ^$ C" K8 q4 n
Open Source Implementation 4.3: IPv4 Checksum in Assembly
0 p' q' X, I/ ~Open Source Implementation 4.4: IPv4 Fragmentation * E: v2 G* r E4 U4 z
Open Source Implementation 4.5: NAT
% A$ X2 @( ?# E I2 J7 kOpen Source Implementation 4.6: ARP
4 U) K/ O# v ^Open Source Implementation 4.7: DHCP
9 M9 S. f" ?2 E3 \! |; P# U. dOpen Source Implementation 4.8: ICMP
# K# o+ b8 A! AOpen Source Implementation 4.9: RIP
3 ~7 B3 d, U( R& OOpen Source Implementation 4.10: OSPF
+ u# r9 I. D; D& \% W; ]Open Source Implementation 4.11: BGP
; Q- W- @) x" T7 |/ o( y- POpen Source Implementation 4.12: Mrouted
) ]. A0 o* J) }8 K' f' W5 Transport Layer 1 \1 U* f0 P+ f! G' l* f/ d+ B
General Issues ; \. @- R( K" i: x
Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs : [! i) J1 X E8 X' U
Open Source Implementation 5.2: UDP and TCP Checksum # d6 L* t! W* [' }0 ^- [- v z" F
Open Source Implementation 5.3: TCP Sliding Window Flow Control ( Q# R8 z9 v; \. y% g
Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance
' U/ K- w8 ~0 m! fOpen Source Implementation 5.5: TCP Retransmit Timer $ w7 ]0 T/ X8 l6 A2 J
Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer . ~2 W D, H" W
Open Source Implementation 5.7: Socket Read/Write Inside out
: ~! @* _- a* aOpen Source Implementation 5.8: Bypassing the Transport Layer 4 V y$ |* q- j; y! D* }6 P, f
Open Source Implementation 5.9: Making Myself Promiscuous O: m( o/ A C
Open Source Implementation 5.10: Linux Socket Filter
$ W: K1 h% y8 ]% O8 H6 Application Layer
) k* P [8 D# k+ E6 g$ MGeneral Issues
) `+ a% a" x2 H/ aOpen Source Implementation 6.1: BIND 8 j/ w, d1 c) n9 g. L
Open Source Implementation 6.2: qmail
/ [8 {2 m. d6 A% f) @) ZOpen Source Implementation 6.3: Apache
' w- q& L7 @! o, W0 o3 ~5 H4 WOpen Source Implementation 6.4: wu-ftpd 9 b( G5 R2 L! P# E# ~; z: S$ \7 G
Open Source Implementation 6.5: Net-SNMP * {9 j4 f q' e( n) q
Open Source Implementation 6.6: Asterisk 2 {# l) T( D& e m, a
Open Source Implementation 6.7: Darwin
8 [: q7 ~3 n4 R: c' y" V0 B$ m. |Open Source Implementation 6.8: BitTorrent 5 U- ^3 k% f# }! k5 P# b
7 Internet QoS ' |- w1 P9 B9 L
General Issues 9 m2 [/ M; g( e6 W* L( t% l7 r
Open Source Implementation 7.1: Traffic Control Elements in Linux
& T( ]* _* z# {- Q3 j& f8 E) SOpen Source Implementation 7.2: Traffic Estimator
, p ]+ {, [% U. gOpen Source Implementation 7.3: Flow Identification
; k/ R# a: j2 l) Q* g; eOpen Source Implementation 7.4: Token Bucket
7 A) h4 z$ G( Z5 @: r0 o6 l- kOpen Source Implementation 7.5: Packet Scheduling
( P; x, _& E$ |& YOpen Source Implementation 7.6: Random Early Detection (RED)
5 m( n4 g; T2 d' ^6 o* M5 K( B+ m2 y# O8 Network Security
1 z4 q @0 O. k+ U( ^General Issues 0 C! k# N1 g- X4 d7 m8 e9 k
Open Source Implementation 8.1: Hardware 3DES
% f; P' ]: O& L* u% ~, LOpen Source Implementation 8.2: MD5 7 P7 c! c" b1 ~7 L* R4 T7 `
Open Source Implementation 8.3: AH and ESP in IPSec
& G$ P; x3 M$ c6 s! S7 FOpen Source Implementation 8.4: Netfilter and iptables
( {" E; t6 i) i; eOpen Source Implementation 8.5: FireWall Toolkit (FWTK) $ i# T$ Y/ K* f8 j
Open Source Implementation 8.6: ClamAV
# e% i3 B( b2 e, ]* v3 j- P$ xOpen Source Implementation 8.7: Snort
3 |) H0 V) o1 t. n R! fOpen Source Implementation 8.8: SpamAssassin
4 A- ~/ W2 k9 b8 i | 2小時
& P: x& s2 B* R# ~0 s! L" t6 p; X0 I/ K
& p+ [2 g) v" K: b
0 w# u' g: [7 I& y+ E" v% \" @! H3 B* t; J
, O9 E& J' w$ t8 E' e
0.5小時
1 J8 B& V( z+ n& P ^& K9 o
6 Y3 x& G" j! ]3 F
0 \+ i# {: H/ g2 U! T. u w* o' w8 G2 ^! f: V
0.25小時 , d" [8 g) F5 T& s( Q
9 O: l( V' W1 {# E7 Z9 c7 T" X8 i1 B6 r/ |3 a$ _# V( L
) _) i- T& m0 a$ P
9 l2 `" j7 i+ e2 ~4 W
! |1 D: c8 T, s' N7 ^+ x2 T0.25小時
- c6 d/ }! R* s: U$ i; {) L3 d
# b3 ?+ n# Y/ G% q, e% p5 Q' c0 }; U' q/ h0 D) A- _
/ Z7 r6 a, P3 ^. i3 x0 G2 k
" s( q1 f" v! Y" M1 z: x8 l# Y3 I. z( ^8 H6 e( m
8 S! I" P+ n3 y9 g4 N0.5小時 h/ a9 @/ Q+ Z/ J. X% P7 F
1 L% _' W" E9 z' i7 ^2 }: e: n2 C5 _9 D" u# \' o* O- ]) }
! i9 x2 t9 |8 a
1小時 ; X' M9 `7 v" W2 |9 S" j
9 c# Z( t6 v, w* s, F2 E9 Z2 F
8 H2 w0 U! @. w) I
* T) g" \; a$ V& _8 m5 W2 i- n5 w% w z
2 P. w) b1 ]8 M
- v. I7 Z7 }" m z% f. @8 i# r
4 A. J: y, \9 G
- H* K/ I% n8 V% N) A" W' V) B; I: Q. h- s$ l3 B' V
1 G4 a0 X% ^+ x7 [
9 I3 z0 n0 ]: ~) P4 l
) i6 T# x6 f0 G5 [0 o0 N
1.5小時
3 |# y- q1 k" T' P! w0 b0 B8 _. a! }% P: v( G: j
4 Q& g% r# e3 z! O$ }; C
( V4 d+ d& P4 m1 R/ d2 x0 R4 ?) u: y
! T% m1 i5 f9 ?1 g3 D# _; ^7 |4 M: u7 X: z
' B5 A2 e& @ v
) D0 u5 A1 ]/ U, K. H' ]1 ]/ u% S
+ a. T0 R D/ L L- k* x3 s( z. D8 z& z! D7 V
' |2 B j0 i5 G% P, G( x+ Z3 {0 C
# y$ P' P e5 z8 {4 P' g, O, M4 _, g- @
. E/ D: C3 k: t5 A, H& t
1小時
! _ M$ _# L( ~
$ v% a7 |4 [+ B* @: Z, ]8 [; F# {
, h8 ~, I9 D; j. @# Q
5 z0 n2 B U: l; S7 [! Q% ]( b. x# I4 r" V) F
4 [8 J! y p' s/ ]: t# `
" S% h* C, u1 d% m4 c
' }% E# U$ q& M. `( t8 k! z1 h4 p7 ~5 [- H" P, G
( D% I8 L% d3 @' H# I+ p
* @- C% ^: x$ X. e& M
: J' I: K$ a! \! N: W# S2小時
2 M. P# w% W+ V
( z$ T2 s& m- T7 q3 o- c7 g$ b! P. R7 y: ]* h! ~
7 I5 B# h9 Y7 E7 {
1 D2 |' _1 R# h' u) v
2 b! K0 T6 }/ G# ?( ]6 v
# H) |2 e6 S0 |: W W! }; c8 \3 x% l% R6 t: R! n
, R& \0 p! t8 v' t
) {. Y- D( q5 ^. W2 {$ z' U" [
1小時 ) C. t- B0 K1 _6 F+ x/ e" s
! y+ B3 C& {* `- B! R' k4 P: R. N- v! A
# I0 W' `( l/ ~* Z
% S" |/ ]/ \( I) j) X
( {/ ~$ z. U5 v/ V: M
7 T* V; w4 _# O8 U7 g/ ?
2 P" h1 ~, J" @; u% `2小時
i$ M8 f Q$ h$ z/ Z9 G$ q& G2 |& B# @3 Y! ^ U0 }
|