1 Fundamentals
, b; R0 @. N- S; j) d; J1.1 Requirements of Networking % L9 G: Y9 q. V$ h# w
1.2 Underlying Principles & f+ W6 ^" F3 W; N
1.3 The Internet Architecture
5 h5 z" K# v: b$ O1 q$ W% Z( `1.4 Open Source Implementations
/ X' v6 }4 ]: o! n. b1.5 Book Roadmap: A Packet’s Life
0 {. |6 p( o2 t* Z; \% _Appendix B Linux Kernel Overview . l0 M3 Z9 T) l$ [1 n& O k
B.1 Kernel Source Tree 2 g3 ~& j2 }4 M* y9 k1 S9 @ V$ q9 I
B.2 Source Code of Networking
: M! ^1 J1 @, ?3 ^/ \/ g4 r! QB.3 Tools for Source Code Tracing
* s# y0 Z, n7 M o; QAppendix C Development Tools
+ Z+ g; }- W, N) eC.1 Programming , X' k" i( ^1 T% A
C.2 Debugging
' m) l: C/ Q' \- A5 x! `2 zC.3 Maintaining
! M% i3 H! t' ?/ BC.4 Profiling 0 h! `! x# o" K- \
C.5 Embedding
/ C8 q) P m3 P$ t! tAppendix D Network Utilities 0 |/ X+ [. a- O: G3 L$ N$ p$ d5 {
D.1 Name-Addressing
/ j1 v" {; g/ ]& A3 o0 e$ uD.2 Perimeter-Probing + i& Y/ c% {7 N2 U. V# j
D.3 Traffic-Monitoring ) K, g) ?1 `+ n3 \- f' P5 U5 e) K
D.4 Benchmarking
$ C; |* s D2 N3 |: j# D% J" [D.5 Simulation and Emulation
4 A- s' i# Q8 f# n# J7 I# ?0 aD.6 Hacking " Z4 T3 e+ U9 \& S/ q0 k
2 Physical Layer : \' T ^" s. M# M2 N
General Issues
4 p' f; O5 y5 o) p- H& U5 XOpen Source Implementation 2.1: 8B/10B Encoder
3 M3 |' z4 p0 d& v! D0 `3 _- fOpen Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM
& S' X4 L% W5 {. T* U3 Link Layer ' M# g L; q" D3 r. P6 r
General Issues % a6 u9 l3 i- A5 y; ]8 D
Open Source Implementation 3.1: Checksum 3 P# g) A5 B+ e) z2 @+ z, M
Open Source Implementation 3.2: Hardware CRC32
5 f1 W( {6 e4 w5 q5 ^$ J: a7 j. m; c/ MOpen Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs
1 L; P7 r& X$ I$ s+ f+ uOpen Source Implementation 3.4: PPP " E- G/ i( O E* F, L4 ~6 S
Open Source Implementation 3.5: CSMA/CD
7 z% _/ f6 ^7 y. zOpen Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2
: \6 w( {& f& Y( f, M! t# v+ iOpen Source Implementation 3.7: Self-Learning Bridging
/ ^% J% }. _9 KOpen Source Implementation 3.8: Spanning Tree 5 \8 n1 l! ^' I1 e# y0 }0 Q+ \
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA 5 T C+ j. Q/ k0 P* t" b
Open Source Implementation 3.10: The Network Device Driver in Linux
& D I, Y8 B4 R- F4 Internet Protocol Layer
( |! ]0 F) U" P' F2 s, u! F7 ]General Issues
( n( h% }: f' g# b% WOpen Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs * q( T5 i- y0 h
Open Source Implementation 4.2: IPv4 Packet Forwarding
- A6 s9 _3 N; \( g; G( mOpen Source Implementation 4.3: IPv4 Checksum in Assembly 5 G/ h8 V0 E2 X* M; g* K* I
Open Source Implementation 4.4: IPv4 Fragmentation
y" q3 E% f9 T& C! VOpen Source Implementation 4.5: NAT & }+ c0 ?4 W1 I1 \; K' H
Open Source Implementation 4.6: ARP 1 F0 P; Q& a2 f9 J
Open Source Implementation 4.7: DHCP 4 w$ c" Q; v! Q. F
Open Source Implementation 4.8: ICMP
' f @9 {. h! V$ f! n2 a0 lOpen Source Implementation 4.9: RIP
9 F' Z/ p1 R7 J; TOpen Source Implementation 4.10: OSPF
: S% Z" t, ^- `4 L% XOpen Source Implementation 4.11: BGP
, T. v' V, g0 X JOpen Source Implementation 4.12: Mrouted
" M3 M5 O. R2 G7 ~5 Transport Layer
. L0 |! }9 P! T) x9 zGeneral Issues
$ p. k8 C3 ^# @5 z: |! eOpen Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs
- J2 _$ w$ b, ]) z$ nOpen Source Implementation 5.2: UDP and TCP Checksum # _6 m) ^7 i0 S0 Q
Open Source Implementation 5.3: TCP Sliding Window Flow Control " ^4 R7 p6 l& s- U! B- Q
Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance : ~9 E1 v' ^; Q, [. I
Open Source Implementation 5.5: TCP Retransmit Timer
/ } `9 C* ?8 h8 n9 qOpen Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer : _6 J0 }9 B/ P! F
Open Source Implementation 5.7: Socket Read/Write Inside out ( d" z5 ]7 l. N% X
Open Source Implementation 5.8: Bypassing the Transport Layer
9 y" n& _) K8 o& lOpen Source Implementation 5.9: Making Myself Promiscuous
6 L. K: u; `% [" ZOpen Source Implementation 5.10: Linux Socket Filter
5 i$ [4 b Q0 v& b) S6 Application Layer 6 \* C- r8 `7 c" h* J
General Issues : |: R, p$ ~) U5 ^: f
Open Source Implementation 6.1: BIND / G8 S u+ q" U& \' r2 A9 V
Open Source Implementation 6.2: qmail , p: X6 C# g4 M1 F
Open Source Implementation 6.3: Apache 8 ?: g& C Y: O5 `3 o- Q
Open Source Implementation 6.4: wu-ftpd
% R- G7 g2 j8 } L/ M2 V9 oOpen Source Implementation 6.5: Net-SNMP
1 n7 _1 `; U$ f3 P. _! EOpen Source Implementation 6.6: Asterisk # }* p- Q: K5 Y
Open Source Implementation 6.7: Darwin
% r$ g% L! R( g$ R9 kOpen Source Implementation 6.8: BitTorrent
5 t( C+ O2 i( N/ ?$ H7 Internet QoS
& f/ O" d2 i; C8 Q; PGeneral Issues
9 g' g9 L. }/ `5 l" }Open Source Implementation 7.1: Traffic Control Elements in Linux * j- m4 g( Y6 x& v; N
Open Source Implementation 7.2: Traffic Estimator
! V+ w4 _- w/ L. D' uOpen Source Implementation 7.3: Flow Identification
7 |2 V' w' ?- q9 POpen Source Implementation 7.4: Token Bucket
$ `% ~+ k3 h# q2 T- K( [Open Source Implementation 7.5: Packet Scheduling # S: ?( h: y$ o. @% e% A% K
Open Source Implementation 7.6: Random Early Detection (RED) : Z* L. a$ m( A5 m8 c+ M
8 Network Security 3 g3 f t- a# d
General Issues
3 Z. k' e% }. N. j3 T9 [Open Source Implementation 8.1: Hardware 3DES 3 t: U8 [% d, n* p0 M2 d
Open Source Implementation 8.2: MD5
8 O7 n: x9 M! Q: \ S1 ]. oOpen Source Implementation 8.3: AH and ESP in IPSec
3 I z+ h8 t8 }8 c+ i# WOpen Source Implementation 8.4: Netfilter and iptables 3 R+ F8 X2 P% F
Open Source Implementation 8.5: FireWall Toolkit (FWTK) ) U4 |7 k- `3 Z7 H6 p
Open Source Implementation 8.6: ClamAV
# C2 E; Z# D9 ^8 x9 d yOpen Source Implementation 8.7: Snort ; q7 t# ]% A1 D" {$ ~9 A" Z" r
Open Source Implementation 8.8: SpamAssassin
: L8 ~5 r% u- r1 o | 2小時
, R9 U1 F# \8 W* f, H6 s4 X
8 a5 \5 w* q. ]3 [6 e5 s; ]$ D |! B" b& C
$ g: X6 T, k5 j' Q: H3 A+ D, L
0 M2 I2 e6 j2 s- j7 n4 C7 J( r: Q2 c2 I5 k1 P& Z
0.5小時
2 ^ A ?; L- m+ `
}1 e2 i6 H4 L+ l8 v# I" x% ^2 P+ N% L+ b, @# I( n: ~% t; u+ h
' |$ O% T6 q! N; U* }9 e0.25小時 # p4 D6 D- B( B( ~/ R5 |/ i
$ J" P/ K! Y8 _$ J2 _& ^+ Y" J7 x( z5 }; e/ q
4 g- P; m; n" m, m1 ^: o0 \! E
% P( k: v' S+ P& O3 C1 j, D0 E; `0 M! R
" l/ C; K- ~: j, _* n0 G0.25小時 & x6 p% w+ \- s. r7 z
% ?! n- P/ y0 }. `( |! L4 T
0 ?9 |5 F, H+ d! [# l; K2 [8 B; K/ _1 t
8 B" ^4 O2 C$ ], l; Z4 P K3 g1 e1 R [/ v* I0 r" D/ }
2 U5 {" z5 G) M. x) G# ]
0.5小時
* s% q: z3 M, W9 N' V
+ s: D: K! z! ^2 L h8 I
8 x3 q. D6 d( R( g ^4 Q+ U
6 `8 @9 e' }6 t7 z/ a' ~* S* L' Y2 Q1小時
* w, {: U$ U. W) r' U( S
7 ]2 U# h6 N- v5 g% c8 r: y, R+ k9 Y. ]* k
3 a: y) T+ @) D- f
) N: d: _- k" B2 L+ E
$ o) a6 ^: y. K0 B0 ^7 v2 `
; ~8 O3 C. V/ Z) Z% c* l8 W5 L& l, g& P
- ~/ d: x/ d g# _' l6 b( s6 t
1 j+ b5 `1 Y0 f; b0 H
; N2 r: E; C- F9 J' i+ A$ ]8 X
* Y; c+ `/ T# L7 N! ~4 d) K* R6 y! u; i& }
1.5小時
2 z. @+ p' D( O5 r4 a
7 ~& }2 H; T j
5 L- _$ |2 i1 o" g1 s, O/ w7 y R6 I3 g& U. |% J' G
$ F0 O/ G1 D5 A
. h, `3 A7 y+ s
* ?$ j' \! i1 t3 H ~. _
% y/ Y7 _9 t/ z) |# |/ R& G% i% f5 O
5 q7 w0 s* f& f- t
* `9 e6 o0 }% S9 J/ w" Q: t
/ O+ d/ \4 {+ f) |$ ?( `' ?4 P# _
& \- {9 B* f ?
1小時 . ]: e1 d9 O: g9 |. W# H, @! y
! S2 j7 a N" a
( W2 f/ Q2 W; V6 x
! M. D7 K2 h4 r6 c
+ X1 c6 a5 M: G! R: E( E! m, M
5 A1 }3 _ l- j0 m. B& k# Q8 C- V
" o. W$ Q3 C" o
' L# p1 W+ F: x( B
4 o; l/ Q! ~- o; ?
C. A& x/ X! u3 p1 r7 e
: l) m6 f, E" K+ P; w, [
6 |4 q/ i: \; l4 o; F
8 ^- J ]; e3 U- F/ D: F- m- Q2小時 ( q# r4 q) S+ n
- j, D* c: m) N5 q( p: C& d; w# {3 I6 U L0 ?% d( F9 e0 S. W
: |4 d, k- b2 L* ?6 B- q, M' t4 G- V8 ?/ a/ ^9 r f$ Q3 N& R
: W# t, t; L7 I- \
5 l3 M- ?1 e2 |
; G; i9 I+ x5 R5 |" M0 h' A
1 K, t% R; W2 M$ |5 s2 a5 E6 K
) b% E! P1 z5 V1小時
3 S |5 w7 [8 f0 `6 d" t' j# ~0 l" q- a. Q
) Z1 R- {) w) D) Q& h
- L0 ]1 |' M5 L+ ^
' X- W( F' y: H. n
# }! V9 |& Y5 ^+ A; f
& y; Z& S& Z8 P$ h8 H: L, u
/ }2 ^' Y% n2 E- e! j8 m4 i2小時
& _: w7 H) \: K p
1 J' m) O0 ^) c L9 M3 D" x |