1 Fundamentals
: C2 J* m8 c$ t. C4 ?8 q6 W1.1 Requirements of Networking
* N4 Q+ Z/ |. e+ g1.2 Underlying Principles
( d: R- F) R* ^8 r, ^! \% U1.3 The Internet Architecture
5 p5 S9 K) U# {# u1.4 Open Source Implementations * G; P: }9 W0 S+ T7 ~- r
1.5 Book Roadmap: A Packet’s Life : a3 O* W% @8 V4 \
Appendix B Linux Kernel Overview
}1 Y# e9 L* A# e. w6 I+ RB.1 Kernel Source Tree 2 W9 T9 p' Q2 w" Y: R+ d d
B.2 Source Code of Networking 4 v5 o- Z0 w E! q& G" w! W4 ^
B.3 Tools for Source Code Tracing X8 i' T. I8 w \2 g
Appendix C Development Tools % Q2 i& S2 `) I
C.1 Programming 8 _+ Z2 Z; \ d* `/ v% s- \: W4 k: a
C.2 Debugging x0 t; ^" q9 J# O% C8 B! K M
C.3 Maintaining 2 ]! K* z- u& n! H* u8 ?: Q8 \4 k
C.4 Profiling ! g4 Z. }5 K0 r
C.5 Embedding
8 R/ ^& Q! o; O# h+ I) wAppendix D Network Utilities
* ~- L! V; J, q/ u: @D.1 Name-Addressing
: j! a1 V1 O6 O. {9 v( ~D.2 Perimeter-Probing
* [( W% [. I9 W' yD.3 Traffic-Monitoring
: X) l2 e) Z7 ^$ ]# l1 l1 h/ gD.4 Benchmarking
- q( h N$ U' ]% vD.5 Simulation and Emulation
: g1 S" o6 U, M( E, E7 d, rD.6 Hacking
2 ?& z9 g% q; x1 a& ^, _! `! `0 h1 U2 Physical Layer
/ s, ~' H) f6 U3 o& PGeneral Issues
4 n" } J$ z# }. h, j+ \3 ^Open Source Implementation 2.1: 8B/10B Encoder & C3 E& `! p" b5 u N
Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM
$ k/ u9 S# f3 W* U8 N; j* f* A3 Link Layer ) |6 t. d ?- E- Z; Z5 \7 L/ f
General Issues
2 C! W# C, ?2 _: ~Open Source Implementation 3.1: Checksum / p/ S( `: D- y+ G) `$ r1 y
Open Source Implementation 3.2: Hardware CRC32 3 o+ [4 H1 s: T% O7 e/ |
Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs ; k2 p0 w( H d. l& {
Open Source Implementation 3.4: PPP . g8 s5 T; X0 ~
Open Source Implementation 3.5: CSMA/CD
+ R" N3 T4 i+ C" D1 N; cOpen Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 ! x# J9 z+ V) m( A; `
Open Source Implementation 3.7: Self-Learning Bridging 6 I9 @2 U" N& k, V
Open Source Implementation 3.8: Spanning Tree
7 e2 l% B( d7 p0 AOpen Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA . P# \6 r1 o* i4 }" e
Open Source Implementation 3.10: The Network Device Driver in Linux
2 e6 B( _! ^! u) W$ ^4 Internet Protocol Layer
6 t! i( x+ H) X c% a' kGeneral Issues
R) w% U- U/ I; _Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs / B' A: q; m& P' I4 Z* c
Open Source Implementation 4.2: IPv4 Packet Forwarding
) v$ X; j0 w% N3 [/ UOpen Source Implementation 4.3: IPv4 Checksum in Assembly
- F3 J, y$ B ^# [Open Source Implementation 4.4: IPv4 Fragmentation
3 {$ y$ J2 ?* {Open Source Implementation 4.5: NAT
+ C* I' [" G. [) F' ~6 rOpen Source Implementation 4.6: ARP ; Q( D- k U: {0 L- o7 S* _
Open Source Implementation 4.7: DHCP 1 e. ^+ Z) B6 w6 w6 U L
Open Source Implementation 4.8: ICMP 7 n$ g& ?0 x; [; ?
Open Source Implementation 4.9: RIP ( o; o" M5 J2 F d. e
Open Source Implementation 4.10: OSPF
, t5 b* p2 V/ }: a6 a* zOpen Source Implementation 4.11: BGP
2 _+ f8 w: g! ?Open Source Implementation 4.12: Mrouted
2 v0 g/ \; F7 U8 f- ?3 C/ `5 Transport Layer 5 h/ J( i, t; _: ^ W- A
General Issues
- a/ |9 k$ K( \Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs 3 {: x& M2 \6 l6 F" a% M
Open Source Implementation 5.2: UDP and TCP Checksum
" b8 P0 N, R7 m9 `: D0 P4 V5 cOpen Source Implementation 5.3: TCP Sliding Window Flow Control
1 y8 }1 x7 j- t/ v: p3 JOpen Source Implementation 5.4: TCP Slow Start and Congestion Avoidance ) R# {3 y# g) Z' H" o, V
Open Source Implementation 5.5: TCP Retransmit Timer ) ]. n! W% V! V4 W; O% [" b% k
Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer a" y0 U* e* r+ a7 ^" c: H- G
Open Source Implementation 5.7: Socket Read/Write Inside out # F; N* V0 [$ ]9 l# \8 U- O0 z
Open Source Implementation 5.8: Bypassing the Transport Layer $ {8 d2 @. j( F8 i. W! k& ^
Open Source Implementation 5.9: Making Myself Promiscuous
0 r& @# @+ \) c& I9 w/ s% kOpen Source Implementation 5.10: Linux Socket Filter , S- {# `. T8 @+ |. g9 w5 l
6 Application Layer # o; H" n# h: w
General Issues
" `5 M. m- P- ~* E8 r: ~( fOpen Source Implementation 6.1: BIND
" h/ o5 C( ?- j) ^; r! g+ @# yOpen Source Implementation 6.2: qmail : v+ D3 k+ v: q3 u. n3 J+ V/ T
Open Source Implementation 6.3: Apache
% {. V5 ^$ b. T) q8 Q* ~' COpen Source Implementation 6.4: wu-ftpd
& h3 j! f6 g% x: M% r3 \Open Source Implementation 6.5: Net-SNMP
% K6 X- {2 Z' [( O; Q Q4 XOpen Source Implementation 6.6: Asterisk
! H* s0 \% _2 v" l* U' B3 r. nOpen Source Implementation 6.7: Darwin & r3 p* ^0 E% i8 a" g, F
Open Source Implementation 6.8: BitTorrent
2 c- Y0 B1 e- }' a0 D7 U7 o( }7 @3 \7 Internet QoS
- q9 @: _% @, |& U% U0 Y f' ]General Issues ; x& y; K8 [+ W' t, b
Open Source Implementation 7.1: Traffic Control Elements in Linux
3 W0 A _3 O/ cOpen Source Implementation 7.2: Traffic Estimator : ?0 U0 E, T7 h, q
Open Source Implementation 7.3: Flow Identification - L3 V" I# u7 g. C6 U
Open Source Implementation 7.4: Token Bucket
# i; H0 X( t# q7 x4 O9 @Open Source Implementation 7.5: Packet Scheduling 2 _% i; W- u, G# E3 P. O6 P
Open Source Implementation 7.6: Random Early Detection (RED) ) T& B& c# a. W7 f
8 Network Security # l2 S5 m, E3 Q# r) |
General Issues
8 D a. d2 t0 w ?# }, ` r4 HOpen Source Implementation 8.1: Hardware 3DES
. Q+ M& N+ v, H2 p! x3 i, K' IOpen Source Implementation 8.2: MD5
1 Z/ Y+ u! Y6 {0 ^$ u0 V GOpen Source Implementation 8.3: AH and ESP in IPSec k6 F4 S6 r& d
Open Source Implementation 8.4: Netfilter and iptables
6 Z2 p6 E2 s6 b5 j. y4 r7 lOpen Source Implementation 8.5: FireWall Toolkit (FWTK) $ w" _$ A1 o: T
Open Source Implementation 8.6: ClamAV
& @6 h. [4 }, c8 Z" U! Z3 J- dOpen Source Implementation 8.7: Snort $ z( U8 h! ~: Z/ R# b
Open Source Implementation 8.8: SpamAssassin
+ w, ]/ D4 J3 f" L: h | 2小時
2 m0 M/ ]4 C7 M4 p S( @
: ]/ O' V$ _2 L* ~$ x4 |
1 W L2 q! ~- e8 r. G0 b4 V& p1 F+ c$ Z7 O1 ?
/ L9 {, h* y/ q# t3 M% P
+ Y5 h( Y7 w M; ` M( g4 @0.5小時 0 n0 d4 i4 `8 E
/ b1 h7 c2 ` \4 ~ C$ \; }
$ y* C4 ?3 l( L/ K4 T( G8 H$ j/ n& U* P# |- h0 N
0.25小時 * U8 d! Z# F* Z! s0 j
/ W% z& T& t; s0 e
+ {" E0 |/ n+ I/ N9 L' n- @6 }, ~/ y9 r( w6 \% D
# e) C6 S! V3 A; Y: i; e7 |6 x
7 {, |7 z; g- R. o
0.25小時 1 X3 l* A0 z. e# s1 M
8 K: T0 G& {* G+ F
; B$ ^( X7 b) ]' o4 \, a
8 F, v+ P9 q) o* G7 B8 T/ A
, y3 d* D* p4 `8 w# o o" ` \, ^0 v- Z6 x1 ]+ S8 [: l
: q" _8 q9 e3 Y" j& O
0.5小時 ( {2 p5 o% J3 f" l" e# S# U
( m. F4 u: d# w/ u& k- F# d, r! e
/ q( N) Y( u3 [) P# ?- P
3 K5 ^" I' X, m2 @" ^1小時 . S$ _) m% v: d6 o1 e( Y& ~9 D
. o6 a& A6 U ^6 X' U6 p# w5 }2 [
4 _) i1 O8 U) d0 T- r1 C' C v7 V
$ t6 c0 m; p" M" a4 A! F
; a1 ]1 j4 @: Y1 _
+ `; o( a {1 `0 P7 Q& H1 a* `
5 ^+ |8 x& d0 x
+ c+ h3 T* T4 `2 E7 A9 S- [3 g
/ @1 c% n7 q' x* V- Y) ]5 f) C- u6 N8 ]' {
& B# w# i, B' R- @+ d/ K8 z( X
+ Z, s" a& M# D( Q# A5 b' \
. W. Z }+ X( @0 c
1.5小時 2 J7 a, D2 t7 k1 w2 |
6 }' ^" I8 G# J: [& E& b4 r' T; f5 M4 T& T, H n
; }. p( O+ s5 ~+ }" [
& d' i; u: }! M" R u- b
- r6 F3 r1 s- f7 a
9 n' m5 Q0 g' q$ A6 \0 J
$ w5 t+ a+ V5 |# ]
$ }7 C0 D: h3 r j( _( S, C
/ r" Y7 w3 _2 g" }0 s
# {& r' O& G8 [4 W$ y1 O/ C% _" ?! b" @ e l8 T$ ?, V' i
/ |, u0 O* }, y6 t
8 l4 o H5 s# K/ {# G# i( ]8 U1小時
0 r7 D- W) Z7 Q2 ? Z" W" b" ~0 u: w d
* C* }2 G+ J- \7 c( r( l$ y0 }0 _3 V) H6 u; ]1 }- b5 {; Z
& F; i5 j. p9 B2 e& P, k2 p" r5 y- ~3 N1 O* j% d I0 Z
& i: G; _) H3 Q# b% _4 W: W7 i" F# Y0 ]
% c9 H9 _5 t$ b4 V o0 d0 E/ u" {
# l' z$ V7 q! `4 c! \' W! C8 f' t% r+ i5 ]0 {
# Z: }! R$ Q5 J1 p
( g) k" P4 N. W$ ]6 A; l8 k
2小時
# ?3 I. i: J3 r' ^* ~6 O, ~% E
; x7 E* \" }& v9 M" ^5 M
7 [- a. D/ `+ ^$ H% B4 z6 w# Y) D, e* z
% L5 b% I7 D5 V" C7 }' J% s- C
" c. ]. P7 X6 u# z2 |* `7 K9 X1 T
2 z* s8 Q" P* X8 D. _
2 c& y$ z m+ a# a9 s
& z8 m& \2 @0 L; }
8 A3 J. d3 y9 X- ^6 y4 s" \( j. Q" f1小時 9 Z% @, U9 ?: R/ p3 ^
' }" L0 W6 t4 e) A- |5 @! H2 j; S! b+ l9 o2 Y8 U* j& s
+ P) O6 z* G+ F; m' o3 E3 B
: Y! m5 j' P/ E: g9 S6 v1 W
) T f! r D* `, q/ c1 E7 q( |% v, p3 Q* r8 b) i: f X1 ~9 ?
/ t8 g2 Y7 C& W2小時 1 V5 q* K1 p, O
& _5 h: Y1 L; V3 K0 D+ |
|