1 Fundamentals
$ u! J) X5 [9 [; a* Y' l( W2 u1.1 Requirements of Networking * z: L7 _" B1 y" T: ^
1.2 Underlying Principles : m' P! o7 e2 m& x4 K3 q3 l$ R+ M4 q6 i
1.3 The Internet Architecture - t; R! j* _* n- m; B
1.4 Open Source Implementations
* ^3 d- R1 W, \/ M. p1.5 Book Roadmap: A Packet’s Life
& F' g/ X0 a% ]* D8 EAppendix B Linux Kernel Overview
* m) X# K Z Y9 hB.1 Kernel Source Tree
, ]7 _, l+ A0 H, Y& ?$ u* lB.2 Source Code of Networking + d' T8 ~/ [9 ]6 i& l2 j1 n; u: o! Q
B.3 Tools for Source Code Tracing 0 t8 p& G; w+ d' {9 h1 q- y
Appendix C Development Tools 3 K4 s, }$ B4 w0 G% p' ]. m) I4 i
C.1 Programming 6 [+ }2 H8 X- O/ W1 ]
C.2 Debugging + A! O/ h- y* Y9 _
C.3 Maintaining
5 { U! `" h3 r- g1 O* ^C.4 Profiling
; e( a( Q$ z. S1 X5 p- Q9 }$ i% HC.5 Embedding ! _' B; z6 ^; \2 b1 Y; d. Q* P
Appendix D Network Utilities 5 A% d1 G2 i! k$ r7 e! R
D.1 Name-Addressing
( s X5 B7 i1 ~, zD.2 Perimeter-Probing
% W9 X R$ c% r2 ]* U rD.3 Traffic-Monitoring 7 x- E/ ^9 F0 p6 G
D.4 Benchmarking . S) I9 {4 B* F* d' \8 J- J
D.5 Simulation and Emulation ( ?9 ~5 ~- w( c9 P( F/ R# _* o
D.6 Hacking
" l/ z/ [7 d/ s' a9 q1 ~2 Physical Layer " u- S3 A3 v; D% H. U( I+ d* s x
General Issues * e# ?. _3 p$ `/ v5 l' [
Open Source Implementation 2.1: 8B/10B Encoder
. U+ n7 e4 L& B5 _1 }+ JOpen Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM
7 E( h, R1 y# n+ Y3 Link Layer
5 S% V- J0 V7 Z' a' XGeneral Issues $ q$ G! e! E* s7 s5 E: Q ~1 @
Open Source Implementation 3.1: Checksum ; J; M; @6 C% Z7 i* K: H# K
Open Source Implementation 3.2: Hardware CRC32
( I' x! z% O5 b8 q; k5 B4 c4 C) wOpen Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs - @3 ]" Y$ v8 c
Open Source Implementation 3.4: PPP / |' i% F1 _1 d [ a# y
Open Source Implementation 3.5: CSMA/CD
9 d- N: U3 F. V% j$ B; A: lOpen Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2
) `0 V' l3 O7 I9 w2 sOpen Source Implementation 3.7: Self-Learning Bridging # d- e+ C. k; x9 z1 D
Open Source Implementation 3.8: Spanning Tree / I4 ], w3 G9 }
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA
- P) \$ T6 z% w/ q6 m( K% g' ROpen Source Implementation 3.10: The Network Device Driver in Linux
* y$ `) R6 a2 R' x" V3 }2 [( `4 Internet Protocol Layer
1 F& ~7 z; B2 {: kGeneral Issues
/ v" Y$ }) M" Q5 W7 _' iOpen Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs
0 P8 Q6 G+ b- u7 j7 r$ QOpen Source Implementation 4.2: IPv4 Packet Forwarding ' i3 S1 v+ Z, Q8 d# O) Q( o2 x
Open Source Implementation 4.3: IPv4 Checksum in Assembly
* g6 {* k4 {+ N# t/ o. x1 {4 \" vOpen Source Implementation 4.4: IPv4 Fragmentation
* l0 k& R! L' L1 k# K3 d; P# UOpen Source Implementation 4.5: NAT
1 r8 r R- M' j+ ~) `Open Source Implementation 4.6: ARP ' f! {, P3 K) y
Open Source Implementation 4.7: DHCP ' u# ?2 S& x& s1 M" k8 L' X; R6 K
Open Source Implementation 4.8: ICMP
( I |7 n" b8 I$ JOpen Source Implementation 4.9: RIP ; ]* S7 s/ L# t' X3 f
Open Source Implementation 4.10: OSPF 4 c6 h0 [+ m4 s$ b. _ g2 n
Open Source Implementation 4.11: BGP - A+ P9 _2 a+ n
Open Source Implementation 4.12: Mrouted
* s6 v3 {* ?9 I2 u5 Transport Layer
( ^4 S# i8 v! O) {$ cGeneral Issues 5 q) g' I u! u& ]
Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs
& V, V9 C1 _+ L, ?$ V& q* _. ^Open Source Implementation 5.2: UDP and TCP Checksum $ G" X* q( E8 U
Open Source Implementation 5.3: TCP Sliding Window Flow Control
. k m2 |* P! N' E( POpen Source Implementation 5.4: TCP Slow Start and Congestion Avoidance : q+ ~) l, g* o, \7 o$ z
Open Source Implementation 5.5: TCP Retransmit Timer
* W- c4 q& B% s9 r$ `, ]Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer
9 K, o8 n ?, `& WOpen Source Implementation 5.7: Socket Read/Write Inside out 8 T4 b& T/ W0 x* w5 r! u
Open Source Implementation 5.8: Bypassing the Transport Layer
' x `6 y+ \1 \: jOpen Source Implementation 5.9: Making Myself Promiscuous
, N9 I' @: X9 i, N( dOpen Source Implementation 5.10: Linux Socket Filter ' K3 M; g* w$ @2 X7 @9 `% D
6 Application Layer 2 @4 W& m# F% T
General Issues 5 |/ K. Z" F' R( u( T. m
Open Source Implementation 6.1: BIND
& k1 V$ R- S K) r; F# [! uOpen Source Implementation 6.2: qmail
& {6 f9 \' p" ?# NOpen Source Implementation 6.3: Apache 3 X4 M7 F- p/ ]: t! N" ~
Open Source Implementation 6.4: wu-ftpd
. P9 D" _1 x* i( s; MOpen Source Implementation 6.5: Net-SNMP
3 d8 ~8 r/ b1 R% T, L/ BOpen Source Implementation 6.6: Asterisk
! T! G: L" b4 a3 aOpen Source Implementation 6.7: Darwin ) M J5 G2 ^# \" p8 Q7 t5 I2 M1 c. Y
Open Source Implementation 6.8: BitTorrent - a2 e, ^7 W6 L. }5 K- [$ c
7 Internet QoS
/ G4 w" l5 ?: RGeneral Issues ( r) t% N9 u, ^" t8 K
Open Source Implementation 7.1: Traffic Control Elements in Linux
# Q' J6 p+ w3 ~! `Open Source Implementation 7.2: Traffic Estimator Q# z. T3 p3 s+ n& x
Open Source Implementation 7.3: Flow Identification 9 v- @/ I7 M" M- k+ ~% @: g( C
Open Source Implementation 7.4: Token Bucket / V# t& N4 p1 ?6 M. @
Open Source Implementation 7.5: Packet Scheduling 9 L; j$ S3 X/ A) x4 Q# `
Open Source Implementation 7.6: Random Early Detection (RED) 1 |8 o( r; H1 |4 Y5 h1 z
8 Network Security
\$ I* j3 \: |1 KGeneral Issues ( q0 x( E. w/ u i
Open Source Implementation 8.1: Hardware 3DES
, p8 t' q! q1 I. E VOpen Source Implementation 8.2: MD5 + E; F$ k9 [. e* z" B
Open Source Implementation 8.3: AH and ESP in IPSec
- T% A/ N: V) s! j+ |4 \Open Source Implementation 8.4: Netfilter and iptables 5 x1 G$ E6 ?% B- g3 A
Open Source Implementation 8.5: FireWall Toolkit (FWTK)
9 D+ a9 S3 x& y. n0 h! }* @Open Source Implementation 8.6: ClamAV
9 a' K3 L* A( o" E% n6 t4 K5 ^8 kOpen Source Implementation 8.7: Snort
P/ P; w% v1 l! z: M H* C1 ^Open Source Implementation 8.8: SpamAssassin
( f1 Z, k& @/ Q1 `4 a5 Z; F1 ~ | 2小時
# q6 Z8 }/ V- B& j- r( n- K' _( N1 h1 f. y; F8 ]0 F7 X
6 i0 W' X+ |" J
0 O" X2 a. ^9 O7 n7 I+ {
1 N: _+ h! U x/ K, _; W1 I* B
) ]: x9 C) q) G0.5小時
3 e/ k3 N$ H) ~. ]5 [' ~' K( I! x! h8 B& w$ a1 X
2 u5 Q8 m2 U' ^3 }7 Q0 l# G
. M5 U$ Z4 b% m0.25小時 % Q( w, `: t9 a
! |* r+ d- \( F" u7 q' u5 w# W1 f' z: T O% C K
. i( s# F+ E+ b1 B6 ^9 `
& C; R* q% W% b) O) l. t4 @9 f
# ~: u! F, i }$ R0.25小時 ' c' Y: \$ K- S
) |& y& T k) Q4 h/ S( l, w; m' D
( g7 ?! t; s4 R# ?) i
; |+ C! x g8 L6 v4 d- B% V
$ |$ Y h1 K0 j
+ A8 ~- P8 q8 d, X; S7 A* x
' H0 R) z" Z9 A; c/ X0.5小時
0 |; V$ F6 T+ M; R/ O: [7 [, {- p8 U: W) M$ u" P4 _ v
0 U; m5 ?( m! w* _6 z& S
+ ~) b8 Z3 w' T. v5 }/ R& k9 ^1小時 4 U, n0 N) n. k: l& C- @+ ]' g
& i1 ] p" s/ y% W( f+ [
) W& @: x& u4 W p3 Q& Z- w$ g7 T; Q" b7 U% c$ |
! y' y+ s$ G+ @: t, {& h$ V* y) _
3 C u& s/ [$ J2 ]
# ?; c6 V! n, ^# W- \- k: ]' _: \& T3 U2 }+ e2 X& R
9 Q% ?8 k( q. H$ J% Q* V `
7 F+ B( y2 a+ c+ P- M2 c$ d3 I/ u( l
% e( [" b1 |/ K) t6 Z J% z' \3 ]- M% U7 y8 t" p: h2 {9 E
1.5小時 + f$ d7 ^1 d1 G3 t7 s' u
, C- _7 f: X$ ~6 R& W/ T7 `, R$ F* l- E! {$ Q2 k4 x* o
5 k. n8 g/ h7 Z( k4 P+ k
8 p( ], Z+ @6 \5 V3 J! U, n' j. B, a4 I" F
# s# Z, \3 N4 j4 W0 I& s
$ i+ P! J4 r8 q% F) j! F9 M4 E* `8 x% q$ P& P5 r
O* Q! |* K, y4 G! h( M! T$ o+ f& x! z/ `! q2 _, Z5 O& m
4 M( l- l0 g; \; K+ g, m% i9 u9 m* ?7 ?- i
/ G) O9 ^/ j! u# U: V
1小時
* I j f2 d# P' Q* Z$ D6 D1 E% o A) \% a/ W
) v- O% O9 [8 A2 u; f
" {' C/ N9 j: E
* r) M7 J- N" T# k1 _' I: Q) j
5 P3 P; @ L$ d/ g8 A/ @8 A
+ F, [8 K) `; [, j
% z( @) t/ S2 ^6 l3 V
- @$ T. C6 s3 X
# _% o! b/ |; e5 T6 o( u# x- ?8 ~5 F7 B u, \$ l
! Q4 K& n8 h" ~# p" D: D+ i9 P$ E/ E/ M, t6 [+ N
2小時 5 q7 |7 L5 Y l) n0 n
* t+ z$ z9 R+ a3 x1 t! F: I
! A j2 Z7 e3 a# R# \
* j* Y7 N6 j6 |9 g$ v+ z
! P. L" w6 X! n% N* \6 D4 W9 M6 `/ ?9 }: q
) h! Y' ]. { H2 |" i5 m0 {% C5 W k) f; \% h4 B- ^7 P0 ~+ M9 m
+ f9 s& D8 r3 D, q$ M
& M. R- V, I7 A7 y( c
1小時
& n8 S9 ?2 m5 t m; [% Z; c* z0 m9 e3 [+ b% P7 n5 [( D5 x- i; p
3 i4 M$ U% s6 `; `
" k |( s0 j6 G, R+ Q _! Y' `+ S H& p2 C9 j) ~5 ]
- s1 [/ s) h! k9 m" y' W) p B; K3 D* Q
2 P3 `, o. F: A2 l2 I' @
2小時 $ N8 V# E$ w; g+ V% D9 G, a1 I8 b
1 f& h+ @% B+ a6 O
|