1 Fundamentals
; O6 Z9 g& ?9 M$ s1.1 Requirements of Networking 2 e) C4 E$ ~: k! ]2 t
1.2 Underlying Principles
5 X! ^) Y5 {. r! G. \# u$ S0 g) g. y1.3 The Internet Architecture
I- w) L4 {7 G$ K5 r- K5 Z& T1.4 Open Source Implementations
3 U9 V" c% z1 o$ b& O$ \. D5 i1.5 Book Roadmap: A Packet’s Life ( I+ U+ S/ S$ d! K* `
Appendix B Linux Kernel Overview
5 s2 `: s, U2 h! qB.1 Kernel Source Tree v W: {: ~: Y- ?9 O" f7 X
B.2 Source Code of Networking ) Z7 i! V: ^7 f4 ^
B.3 Tools for Source Code Tracing m, c" w3 C; [ J( K9 K9 L
Appendix C Development Tools 8 g% [# B% j9 \4 N( T' ^- x
C.1 Programming # ?. s1 ^9 Q7 G& W7 S# @7 t3 ~
C.2 Debugging % K; V' z# f* O d! l! M0 R
C.3 Maintaining
; ^" Y+ O- k. h8 UC.4 Profiling 7 u2 e k r' ^# o6 p; B) R; H
C.5 Embedding
7 j* V; N/ p9 [7 s, ?Appendix D Network Utilities . t z" k" Y$ {- O9 W
D.1 Name-Addressing % j) \: c$ |5 d; @
D.2 Perimeter-Probing * m9 i! n q5 b% N
D.3 Traffic-Monitoring
0 `6 j+ [) D- c9 j+ H) jD.4 Benchmarking . s6 L. L7 @& f( p; q1 z; n+ L) S2 y
D.5 Simulation and Emulation
9 u/ _; _$ e2 `9 ?1 Z, f5 _, h: _D.6 Hacking , A% G- d- F& c& h" n
2 Physical Layer
3 y8 E7 J9 D! @! sGeneral Issues
' [- S# e, y! FOpen Source Implementation 2.1: 8B/10B Encoder 6 E& F Y+ n% }$ |0 y
Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM 7 Q$ A; N" Q( o) a$ H
3 Link Layer 2 y1 w; n w3 c- r% Q) \
General Issues ; o- X* w, w* x# I3 e8 V$ j
Open Source Implementation 3.1: Checksum 7 ]. A: t$ Y) f
Open Source Implementation 3.2: Hardware CRC32 ) ^9 _, O1 N, p& F; q0 Y
Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs
?. ?* d4 l. wOpen Source Implementation 3.4: PPP 9 |; e& t5 y* t0 O, z
Open Source Implementation 3.5: CSMA/CD ( u! [& V, K: z1 D2 [# O6 d! o4 o1 H7 S
Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 ! S b* w, e6 ?* A L
Open Source Implementation 3.7: Self-Learning Bridging 3 k! z# O* `4 N' h
Open Source Implementation 3.8: Spanning Tree L" |' y7 b0 T$ y- u
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA
2 k& J' n% F1 q, r: w/ s7 q' _Open Source Implementation 3.10: The Network Device Driver in Linux
# h) h: h! J+ O! A7 H4 Internet Protocol Layer @$ @/ K7 }0 r5 U2 }. x
General Issues ?# |: \9 B' R8 u) r
Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs 9 S( h5 _5 e- ^6 v
Open Source Implementation 4.2: IPv4 Packet Forwarding
3 L, p: V/ [; s% ^0 b- nOpen Source Implementation 4.3: IPv4 Checksum in Assembly / z' [: c' f. T# _" v5 y: Q
Open Source Implementation 4.4: IPv4 Fragmentation % r9 |- o3 c6 I% }; s
Open Source Implementation 4.5: NAT
Y/ Q9 U$ J) l+ ZOpen Source Implementation 4.6: ARP + w' g0 x& Q" s* A
Open Source Implementation 4.7: DHCP 5 w, s# c; }& g2 G
Open Source Implementation 4.8: ICMP 8 ^: W0 K2 z' E2 t; X- @
Open Source Implementation 4.9: RIP 5 P( R; J# ]3 r: \
Open Source Implementation 4.10: OSPF ( q4 z; I1 [, m3 z1 @* J5 j- G2 b! b
Open Source Implementation 4.11: BGP
6 b4 @0 P' ~' R" Q. dOpen Source Implementation 4.12: Mrouted 5 ~2 O$ A& y; S; E' b1 e0 T
5 Transport Layer
1 z) y/ `! S9 o, ZGeneral Issues
* z5 S0 [: W4 `- e F: YOpen Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs , F" A* {5 |* ^
Open Source Implementation 5.2: UDP and TCP Checksum
l8 a3 `5 N! X9 s% DOpen Source Implementation 5.3: TCP Sliding Window Flow Control 8 J$ q* n# P3 F" t: ~% V* S+ r
Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance
5 U s1 W. r/ T) x! ^Open Source Implementation 5.5: TCP Retransmit Timer
- \9 U, O8 \* i- H) `7 N( |" qOpen Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer 4 q B, Q# c! L* O* `% e' q
Open Source Implementation 5.7: Socket Read/Write Inside out 5 j! R* b2 ?) ~0 C+ L& M) S
Open Source Implementation 5.8: Bypassing the Transport Layer
% W; }5 V3 Z0 O; u2 W' K& y; U7 O) wOpen Source Implementation 5.9: Making Myself Promiscuous X2 T( K. T$ ^8 b6 {
Open Source Implementation 5.10: Linux Socket Filter " C( n. h) e* U. k Z* j
6 Application Layer
0 D! e4 a! O, o" I# S" CGeneral Issues / J @7 ]" O2 E6 n/ J, @$ q5 k$ h" w
Open Source Implementation 6.1: BIND 2 F$ K1 F, x6 Q5 q* r
Open Source Implementation 6.2: qmail
* t5 b0 q: A: p1 c- f7 L) }1 g3 zOpen Source Implementation 6.3: Apache
$ K1 m9 S/ C2 _! G0 I% Y8 ZOpen Source Implementation 6.4: wu-ftpd
8 j& {" ]& L" _+ N+ ~Open Source Implementation 6.5: Net-SNMP
5 A! _9 @" o! i lOpen Source Implementation 6.6: Asterisk 5 |( l+ ]! N% h
Open Source Implementation 6.7: Darwin 8 y, a5 y! j) `! C& P$ o2 q
Open Source Implementation 6.8: BitTorrent
7 Q1 {6 E) G" X0 ?1 g. h; s7 Internet QoS - c5 ~/ d0 s6 |
General Issues . @* \! ?, q. g2 t. l- [
Open Source Implementation 7.1: Traffic Control Elements in Linux 1 T$ w( S$ U" ]) L5 x
Open Source Implementation 7.2: Traffic Estimator L; j# [+ G$ U( E' j
Open Source Implementation 7.3: Flow Identification
7 D8 Z: U) m) P6 _2 G1 g( ~! AOpen Source Implementation 7.4: Token Bucket ) ?, h+ l3 R$ K: X g$ p; F( g. m
Open Source Implementation 7.5: Packet Scheduling ' ]$ }) @* E* {" w1 [
Open Source Implementation 7.6: Random Early Detection (RED)
; W' @8 Y' W7 m8 Network Security
! k4 z/ k+ r7 n: {7 r* QGeneral Issues 7 s% l4 u; E! a+ Y$ p# r3 C
Open Source Implementation 8.1: Hardware 3DES * D' c, l3 r2 X: C: [1 ]/ e" s
Open Source Implementation 8.2: MD5
+ i# C) X! |2 v* X3 K" G, F, z" pOpen Source Implementation 8.3: AH and ESP in IPSec
) U9 ^! S8 d; o: w5 ^Open Source Implementation 8.4: Netfilter and iptables
: e, |( Z y3 _$ K: ZOpen Source Implementation 8.5: FireWall Toolkit (FWTK)
. o$ K& N, G9 g( C% R* C, ]Open Source Implementation 8.6: ClamAV
& N5 J( r/ Z$ v/ D4 s: }" t* LOpen Source Implementation 8.7: Snort : j; [8 k: G7 m5 _7 {* q9 J( P* B
Open Source Implementation 8.8: SpamAssassin ; f) j0 S$ Z! ?2 K: [8 e6 z6 |* d2 T4 p
| 2小時 3 h7 N% r s& @# q
; F |3 U% u. [) h8 T% ]% D6 {+ s, F2 y
2 p R. _+ b7 |
r4 M" r: \* z( [7 v% O
% U2 p; O* }6 X- \# t$ @0.5小時 : K- Y5 _5 ?# h
% }% [( I6 w1 L6 n+ p/ [& ?: p
$ H8 F' k# s' y& \, m; Z3 w
! X' c- `% X: a3 g; F
0.25小時 + }: }9 |' H" [0 \. r3 ?# A
l& C: f9 T' ~1 d
, I; Z' z; r. j/ F0 S# W& Q, B, c/ a
& \9 Z& g% `0 n8 J: V5 O; k# j9 ? ?, |: h2 T( S( B8 ^
& z( L" g, h% v0 g3 U0.25小時 0 {# W% C5 I* h ^& y
f& t) A) G; n5 [; e4 k
6 S7 i: D3 X8 V: f* I" Y
; }8 ]5 A! o4 h ?. T+ t+ V+ }: O6 }8 U8 |
, L: O4 X" h: `3 h# @* O3 w
$ `* o5 S9 v' d6 T' o; w; F" p
0.5小時 6 U3 b# f, y6 S) @, s
/ M J" H' r- y4 K& _
% q1 f1 b7 U* P/ f6 W
+ \* l0 L' B$ z6 i* w& r2 ], h1小時 ! T C2 f0 y \ v7 D
5 V7 V/ g' ?/ b/ [! k E0 J% `
, D, P+ E9 m- T$ X3 W
J; T/ T! w& T8 l! i, l+ s* v7 C
3 l9 p4 u" W" w- g4 y5 w6 M* u( C8 A/ T3 x, i% L
5 H2 f* N' v$ T v
' S9 I( z$ z6 w) b+ s* `! u) U6 P9 ~! U; z- c
/ L! B- ~# o$ l7 s
4 t& j& T( F( D) t |8 A" S) n! T7 }6 |! Y, Q( k" V) F# A; a
1.5小時 % T* U5 T1 _! t1 ?. c
5 U) \; Y) v- b% j: q
4 M( j P# D- f1 M; Q/ {& B2 o8 ` k" }4 s1 @
# G. ^ a& m$ B" p
# A7 {0 O K8 a0 ~- N# o: h) C, D/ m7 y2 l
/ X8 {, v- {4 W* ^
9 Q* t- f0 N& V2 m* k3 y& H @& a6 {' ~( g
& V( N; z! [7 \9 U5 i
% U: h/ l: K. `) b5 d( Q& d' \" F2 C4 Z! ]4 ^+ K* c
5 ]9 m, T3 ^# r! u) t. {& b1小時
# M8 d; j5 {# Q5 y% b0 M
! a! T7 m" `" }' f1 `) b/ H; O7 s7 S: l7 e" l7 H. x) Q; E v2 u
+ n& G0 {' s# O
2 D9 W8 ~- e8 U* e3 i, B1 J: h& H9 V# e! b2 h- X3 ^8 M+ D7 V
9 y8 e' j7 d8 f7 g
8 q$ C- q+ ^ B/ m* y; `
+ C# M+ T5 h' M0 D) B. ]- }2 R2 i2 V( o/ d7 g q
+ ^/ S4 {9 B+ j, {" [) X
. J7 P9 @3 A/ L8 u
# r( S! y7 f. i: L2小時
8 l* k* y) i- h
2 B( ? S/ {5 _ h9 E0 p9 i; Y# C V& x @! i3 i ?
0 G( w: o* F9 O; q+ E
2 v/ f/ V# G* e; \: g6 G
) R; t& f5 I- x, ~, e! Z$ z0 m- s# V* }2 Z+ D3 `
( _$ s# v) Z/ [8 `1 c2 z
4 ~ l% c' j! m/ m& [$ P: q) Z; s# u9 m- A
1小時 ( L# t7 ^3 k2 }- U0 V
, A! A/ b Z$ {5 ?0 K- X% M
9 B1 y, ~/ m$ w1 s$ C
( S* S4 I: U. m0 r9 v% a. R; ~* ]2 R% V
9 w3 d5 u. Q1 X) j
% o6 W1 |8 y; O5 s$ E9 ?
+ n8 D! M! m; F3 g; _* f8 i2小時
4 i7 |1 B& S2 O5 w! m$ h H1 d; h% P7 w1 v K) G' t& ~4 M$ V' S
|