1 Fundamentals
7 e1 U4 X; t! l. c& D' K/ y1.1 Requirements of Networking - P$ q% Q7 b/ @- q1 `
1.2 Underlying Principles
, c H; w0 o1 ]7 G9 G) c1.3 The Internet Architecture
5 @; q% Y/ E% H9 R% { L1.4 Open Source Implementations
/ v: P& g/ l+ e d$ f1.5 Book Roadmap: A Packet’s Life ( ] f! o. W) L, O( v
Appendix B Linux Kernel Overview
# l% I1 T0 u3 T: Z' r5 V$ X! gB.1 Kernel Source Tree 0 p5 A5 \& [, r# h+ x
B.2 Source Code of Networking ' u4 e, V/ V" B& V7 L
B.3 Tools for Source Code Tracing
2 K0 x5 B1 {1 f/ p1 x8 ?+ q& _Appendix C Development Tools 9 R4 m u4 G/ ]
C.1 Programming
0 v/ d" i, {! m% ]: x* f6 Q; ^C.2 Debugging
& |7 f$ @6 J/ H4 k" |. l; f+ d1 h0 P: ?C.3 Maintaining
6 v+ `# q3 ?8 n, I0 {5 B( oC.4 Profiling - {* {5 e. ?; i7 L, }" k
C.5 Embedding / b) n0 i" E ]. o" ?% l# ]2 a+ o
Appendix D Network Utilities 6 z, ]% u3 ]& y/ \* M' M' K$ B
D.1 Name-Addressing
i: L% Q4 M g3 JD.2 Perimeter-Probing + q$ Y- [4 I! a
D.3 Traffic-Monitoring
& i3 U9 O+ [' a& [5 `( W' YD.4 Benchmarking 9 G! ~- |5 l, }1 w
D.5 Simulation and Emulation , W/ n! n4 V g
D.6 Hacking
* ?+ {* l) {) r3 e2 Physical Layer / C& {. M5 T/ Z6 R% Q( L, \
General Issues
* R5 t% w7 H1 u7 k) ? J( \Open Source Implementation 2.1: 8B/10B Encoder . K; R; ^- s8 U
Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM 3 |: q7 h% t& r8 G' t
3 Link Layer
3 _- v3 U: Q ~4 k( `# e9 uGeneral Issues
& {0 P1 O7 f; {1 E- ROpen Source Implementation 3.1: Checksum
- _ E* v' v2 W4 wOpen Source Implementation 3.2: Hardware CRC32
0 E! E" `: Y0 F3 e7 w0 y* oOpen Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs 2 q, v% z% N0 k5 P- M, D
Open Source Implementation 3.4: PPP
1 k5 q! @5 A; M/ `; T. i9 z' `8 zOpen Source Implementation 3.5: CSMA/CD 4 o8 U4 y- _* _8 {! M( v/ f ]( m/ D
Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2
- H3 u! k3 J. Q5 j, SOpen Source Implementation 3.7: Self-Learning Bridging
1 z# D7 O' k) y9 `3 H5 T3 GOpen Source Implementation 3.8: Spanning Tree 2 \3 R( p" ?. {( y
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA ' w- {. u' B, W0 K6 `! ~
Open Source Implementation 3.10: The Network Device Driver in Linux
7 ?) E3 S4 R- Y4 Q! a4 Internet Protocol Layer
3 O. ]4 |$ F8 ]) e' N2 K, ?General Issues % ~3 |% d: H, E
Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs
& R$ I2 B! h$ t- C& N1 vOpen Source Implementation 4.2: IPv4 Packet Forwarding 9 e/ t. F! p" w6 l p
Open Source Implementation 4.3: IPv4 Checksum in Assembly
# S" ^8 R/ V; m5 aOpen Source Implementation 4.4: IPv4 Fragmentation
% H4 T y- a# ?- K! EOpen Source Implementation 4.5: NAT , `# q$ S: q0 G8 I& X# k
Open Source Implementation 4.6: ARP
2 b5 i- K: H2 g5 }, k5 B9 M. qOpen Source Implementation 4.7: DHCP m% s V8 a4 I* v, c
Open Source Implementation 4.8: ICMP
: J; M; G+ n* V9 F# Z9 aOpen Source Implementation 4.9: RIP
. q0 }7 H4 \0 ~% E4 yOpen Source Implementation 4.10: OSPF 3 _6 j! D) a9 A* o K* W
Open Source Implementation 4.11: BGP 7 t% O7 |* a* |0 ^
Open Source Implementation 4.12: Mrouted
4 m) O- X% d. j5 Transport Layer 3 t9 i; Y. E+ I$ o
General Issues 0 A) ^3 y' D6 O* b l5 V) {
Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs
1 f6 ^* N7 v0 a8 D; t; ~Open Source Implementation 5.2: UDP and TCP Checksum
/ ~- X9 o2 ], a" B. u4 g9 t) N LOpen Source Implementation 5.3: TCP Sliding Window Flow Control
2 Q! w8 f* _$ j5 Q- M1 v2 qOpen Source Implementation 5.4: TCP Slow Start and Congestion Avoidance
, T0 ?0 Y. n5 R AOpen Source Implementation 5.5: TCP Retransmit Timer 8 T% |; q' x k% L
Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer
' L0 x9 s: g/ g- `# \) YOpen Source Implementation 5.7: Socket Read/Write Inside out ; i/ ], ^% z2 R, R8 V4 x
Open Source Implementation 5.8: Bypassing the Transport Layer
9 f2 [0 n4 G. {. v) i: n" \ bOpen Source Implementation 5.9: Making Myself Promiscuous
" I! S$ a t/ a) H; c$ g7 K+ VOpen Source Implementation 5.10: Linux Socket Filter
$ _+ j$ |# E# l5 f6 o1 X; r2 g6 Application Layer
0 K! f: z$ U$ AGeneral Issues
1 [ V2 X( N9 D$ JOpen Source Implementation 6.1: BIND " w8 f- ~# w2 z/ }. y! q
Open Source Implementation 6.2: qmail / D" x0 A9 Y5 a" ]- Z
Open Source Implementation 6.3: Apache 6 D' N9 f7 O; o" V9 z$ R
Open Source Implementation 6.4: wu-ftpd 2 h) g3 f( W% a5 [
Open Source Implementation 6.5: Net-SNMP 5 w" t: J1 U2 d3 V4 R5 A
Open Source Implementation 6.6: Asterisk , f' C, y9 n" m1 o) k7 }* b
Open Source Implementation 6.7: Darwin " _: F' }6 ^& u) O7 z6 }
Open Source Implementation 6.8: BitTorrent 2 R" b5 |: C( x* P% B g
7 Internet QoS - {- q0 O' \# ~1 P
General Issues
$ W2 ?$ T# r4 u/ S9 D! v& b: v9 yOpen Source Implementation 7.1: Traffic Control Elements in Linux 3 C5 D1 z2 T; M
Open Source Implementation 7.2: Traffic Estimator 5 F' z! h( z% g j
Open Source Implementation 7.3: Flow Identification
* w+ Q' c& I$ I8 X" B5 JOpen Source Implementation 7.4: Token Bucket
6 ~9 j# ?5 o* D; n1 h; O( DOpen Source Implementation 7.5: Packet Scheduling : l* k' A1 [9 F9 K4 I* I1 a2 l# J& p1 `- w
Open Source Implementation 7.6: Random Early Detection (RED)
1 Q5 `" o- s8 H) H* D: P8 Network Security
9 m2 x S, j3 U, L$ w( ZGeneral Issues
* G' U0 x& V% E- I1 i- D- Y& i3 u9 @Open Source Implementation 8.1: Hardware 3DES % C( D' L+ A2 E) a; c% \
Open Source Implementation 8.2: MD5 8 c3 J0 Q) E4 a9 H0 [7 Q d% J
Open Source Implementation 8.3: AH and ESP in IPSec
5 F k5 J( p w3 r& {Open Source Implementation 8.4: Netfilter and iptables
) N/ k9 ], t4 L! t" L* s! POpen Source Implementation 8.5: FireWall Toolkit (FWTK) % Z. a& p& m% T2 R" J
Open Source Implementation 8.6: ClamAV
. J! e4 j" v7 l, u& c" G( c! O- ZOpen Source Implementation 8.7: Snort 2 q+ ^0 O: v5 K( {+ ~# a; O' O
Open Source Implementation 8.8: SpamAssassin
; L! B* c+ A% v% t | 2小時 + o1 [0 f4 O2 _2 Z- X: J7 u
+ x7 n1 |" ~- e
3 ?! B" i/ {& v9 @
6 f0 |9 r5 Y" c7 y! c" g. g; C
: g+ J# C! m9 Y$ Z$ Q
0.5小時 4 U; Y5 X( _! a) v8 _; |' N4 x, _
- W$ N6 E8 n) s/ C) A
' y+ E9 E6 v4 H* ]1 y. @, | ~. E* a7 ?7 N) u2 c
0.25小時
4 E# w) T( e) ~4 L; U6 a8 E+ x6 A9 y& l( K
% c% q/ Y5 O' w0 K1 `
0 ` B# d4 \6 e$ A7 @5 h
& i/ z# C3 A) `0 N1 H3 k
1 s# N* X! _6 k4 h. b0.25小時 5 h$ \7 B# y+ Y+ L4 i
- \- X2 H' D C) I$ z- t9 j3 Y, c
8 _! m: K2 N7 q
7 B3 O8 O2 S2 N& u0 W [- X" I% ~2 o# g7 S. R; I
" N2 m/ j) ], u& L. C. U% }
( e3 u0 c" Z6 l+ ^9 B
0.5小時 / X9 O/ d; I4 o! K8 }4 Z) b
4 z, K% g; r9 r1 r
1 h Y5 ?6 l2 J/ d# s# u+ b2 O' Q& M* L) i( W" T& ~8 V% f
1小時
$ m6 ?9 j7 F0 _4 j& p! [* |4 g, A2 y# o8 w5 {) \- C9 n
3 ?4 `# C1 S) `
# u) S0 p; S8 F1 P3 N8 R. y: i2 x1 u- u0 \
$ a. `% j: Y0 W. i, c2 J# P' e: K0 L" E x. s
3 K2 ^% u9 F; f4 j: v) i- [! W" h( u) M+ z: ]$ h1 ~
L) a5 b- [& f9 @, ]8 N5 w$ K! D6 y9 y. _5 L5 Q
$ I. o A" o+ u8 P5 ^7 X
J1 k# t8 {3 u& b1.5小時 " H/ f$ i. h1 X: z4 A$ q
8 V# b; [' [# ^
/ c: s9 o: g% F$ r" n
1 J3 ?0 |% C- e
$ D8 M$ j8 V: c7 F+ d$ m8 j) v, @$ s. y: V1 t
( w6 c8 }3 ^5 g0 n, I3 o
. b- g/ a9 s; e& Z. g, \
% Y2 d7 O3 q. N: }' S* I( a! d# E2 L r7 p
! r7 d) O1 A/ ^% P, {- E- l" V, `+ Z' B; I5 ^0 r
& d' B. d$ u# j. _, P: P+ g) X* p. V
T/ V( r4 i0 W, |+ l
1小時
7 h, a& ~+ M: V: o; V; X
9 A( X5 e( d5 m' t+ I2 a$ _# g7 e1 ?0 H+ J ]. j3 u( F
1 E: F# ` V U* K$ @
. ^- `7 w. V: b$ D# j0 n
- R) X5 ^' l0 s" J
, g; z# b1 r, [) p4 R$ h' N
6 a9 K! I; X* B, k
/ |9 G4 z; E5 U3 |
) t" r [# l5 e7 ^: C9 j; H
6 J! d$ U& m: c- r6 [1 ~
7 o9 G2 l+ [0 Z, ^
0 z2 G& {9 u% s2小時
, m6 z3 J" s' J% T
5 o& G" E6 F: `) n$ W, O
+ @2 C2 r8 Y# E/ @/ u# E2 l# W" u. u2 `1 D
9 b% B/ j$ Q6 i( D e [. j; b# W# ~7 ~3 x
2 ?2 y) e* S! _: q& \; D" ^: Y& H' ~! E$ W( J% ?
) [9 F( Q. P n P3 D" F% `
' e$ v/ b- Y7 u. Y5 u1小時
6 G7 D- c" I* ?- d6 v0 q$ o3 t% A, ]7 X* j6 A3 d
C" K: J: E+ c7 M; \% r3 }
" Q5 _1 @$ g5 C9 v% r
4 G: X+ {: J4 V2 g, W% N% U. J9 }- I& c- L* W* g/ k( e# T
1 E0 U( l7 a# f5 ?
; r1 P1 M2 {1 v6 T/ Q. z2小時 # {* p0 J/ o' [! C8 d7 X- E
' F0 U+ l/ T! ` |