1 Fundamentals 1.1 Requirements of Networking L9 \9 t/ h2 N6 \ 1.2 Underlying Principles 1.3 The Internet Architecture 4 Y% B- M9 e& U+ p& i 1.4 Open Source Implementations 1.5 Book Roadmap: A Packet’s Life Appendix B Linux Kernel Overview B.1 Kernel Source Tree B.2 Source Code of Networking : y; c+ Q! c+ W0 N! j. [2 i! t B.3 Tools for Source Code Tracing % u$ l& _& L0 Y7 |: g Appendix C Development Tools " R# ]9 i" _- }2 W; _( r C.1 Programming C.2 Debugging ' T1 h$ z# g% m! w7 u3 ` C.3 Maintaining C.4 Profiling C.5 Embedding ) K0 g0 o! v0 d* j- u9 R2 | Appendix D Network Utilities / Z* ~9 p. m! ?* |4 [2 q D.1 Name-Addressing 6 B; U9 W5 u- m/ y x' }4 X$ O D.2 Perimeter-Probing D.3 Traffic-Monitoring ; F" I! i ?, G% g9 e+ Q D.4 Benchmarking D.5 Simulation and Emulation D.6 Hacking 2 Physical Layer General Issues Open Source Implementation 2.1: 8B/10B Encoder ! P: ^; c2 M d9 o( B& v1 n Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM 3 Link Layer ; c. w8 x- [, P) y3 P* d General Issues # m9 a( a/ |$ C7 h+ q# L& s Open Source Implementation 3.1: Checksum # T, a2 ^1 E1 S) Y Open Source Implementation 3.2: Hardware CRC32 - H6 S0 {& t7 c Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs 6 i9 C+ O1 p6 ?: G: N Open Source Implementation 3.4: PPP 4 _+ } V1 g0 j Open Source Implementation 3.5: CSMA/CD Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 4 o8 {) ]' q! j4 {9 B0 h9 y( G' H# a Open Source Implementation 3.7: Self-Learning Bridging , B$ Q) E! {! V, _1 `5 T Open Source Implementation 3.8: Spanning Tree 4 ^& y3 e8 \$ B, q0 G0 a Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA Open Source Implementation 3.10: The Network Device Driver in Linux 4 Internet Protocol Layer 1 T7 |9 P( L7 Y/ w) | General Issues Open Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs 8 w* m. Z" J; x$ ~) ?8 Z Open Source Implementation 4.2: IPv4 Packet Forwarding Open Source Implementation 4.3: IPv4 Checksum in Assembly $ F, _( X! ?4 j. U- U; ] Open Source Implementation 4.4: IPv4 Fragmentation . V n+ X7 p9 d+ o2 \ Open Source Implementation 4.5: NAT Open Source Implementation 4.6: ARP 4 l& H) `1 f$ { _' g Open Source Implementation 4.7: DHCP * Y b# n5 D1 { A' x7 X Open Source Implementation 4.8: ICMP v6 ?8 B% o' V6 v7 M Open Source Implementation 4.9: RIP Open Source Implementation 4.10: OSPF Open Source Implementation 4.11: BGP Open Source Implementation 4.12: Mrouted 8 n0 M3 i# s8 q1 c, c, s' |2 \ 5 Transport Layer General Issues ; E( c4 q/ F0 l, E. n( x4 z Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs Open Source Implementation 5.2: UDP and TCP Checksum # X* t8 a% k5 f) }- J8 |) U Open Source Implementation 5.3: TCP Sliding Window Flow Control 5 H# `1 j" ]/ ?" V/ K8 K) | Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance ; v5 _% h0 m# B# q Open Source Implementation 5.5: TCP Retransmit Timer Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer Open Source Implementation 5.7: Socket Read/Write Inside out 3 Z. B* r" h1 s. A6 D Open Source Implementation 5.8: Bypassing the Transport Layer Open Source Implementation 5.9: Making Myself Promiscuous 6 c, N3 s) B& n# R- C2 R; ?2 i Open Source Implementation 5.10: Linux Socket Filter 6 Application Layer General Issues Open Source Implementation 6.1: BIND Open Source Implementation 6.2: qmail 9 J% o; b% N; L8 [ Open Source Implementation 6.3: Apache / b$ l5 S0 S# P% M4 f) {, O Open Source Implementation 6.4: wu-ftpd Open Source Implementation 6.5: Net-SNMP Open Source Implementation 6.6: Asterisk Open Source Implementation 6.7: Darwin Open Source Implementation 6.8: BitTorrent 7 Internet QoS General Issues # \/ |/ }( H# L$ O8 N7 O1 ^, A ~ Open Source Implementation 7.1: Traffic Control Elements in Linux Open Source Implementation 7.2: Traffic Estimator Open Source Implementation 7.3: Flow Identification # t2 l3 ]; s# Z2 ` Open Source Implementation 7.4: Token Bucket Open Source Implementation 7.5: Packet Scheduling Open Source Implementation 7.6: Random Early Detection (RED) 2 S3 N' @# _4 q6 u0 E! e: | 8 Network Security General Issues Open Source Implementation 8.1: Hardware 3DES 4 m C, Z1 q& l( M Open Source Implementation 8.2: MD5 ( g/ I7 Z4 p( b$ p' u2 }9 t Open Source Implementation 8.3: AH and ESP in IPSec Open Source Implementation 8.4: Netfilter and iptables Open Source Implementation 8.5: FireWall Toolkit (FWTK) Open Source Implementation 8.6: ClamAV Open Source Implementation 8.7: Snort Open Source Implementation 8.8: SpamAssassin 4 L5 P5 b/ o/ l+ f) g1 v | 2小時 , h" Y; q0 l, J& f" ~; E* A1 {9 ? 0 L9 ?) |( h3 [( n5 x. ~ # a: y+ a. I$ o6 w% j * y0 E* G- L! Z8 y$ i8 u6 f, S + d. i: a: K8 K+ K6 q; H# q 0.5小時 - N/ ~; R+ X+ y4 q7 H- B6 P # c# {* h ~) [+ c 0.25小時 , C2 n4 i% I8 w - z' p& N, [4 [5 } 8 @: | n) |: v$ m/ K: U4 I 4 Q1 H' I( B# K7 s ?2 O4 F 0.25小時 + B' x8 c+ b) j 0.5小時 ; `3 n. R) k, C! B0 x7 Z : c' _1 o$ Z& l A# a 1小時 + x+ B" d e l8 _ 9 _; F- _# @. J0 T) p 0 [3 ~0 c* c# w # T/ `6 b! n4 H: ?+ _ 0 W1 r6 D6 g5 C 7 v# I! R. Y. r" P 1.5小時 # `% J$ b- N# t, [ `, p ' I& c g1 w; h+ F3 E* v! E ( i& o$ u) Z6 |7 b& Y & r& b, |) Y- d7 H 2 D, `. t1 T: J: u0 x : m* }+ a4 f/ }3 R & m% m$ B- A& ]( k, |6 F/ N% n: { , i" l4 a5 I9 M 1小時 # A. W' |( T. E; d( o L " z7 h% e4 J a* k/ c4 L+ X 9 h+ C1 G$ S# P* t, z. H0 C" n% E & w# u" B9 b# M' O 0 C; X6 }' y+ \/ s$ F u 2小時 % b4 l6 v1 @1 n% U , J; z s$ R! { } 1 E7 u4 n6 p8 `2 s+ w* _ 0 w9 |! o( t2 `6 H* k# k8 u5 U* W9 [ / U: t U, c$ H [8 ?3 I9 Z% I " g/ p$ a. l3 L. t7 W0 ?" v ' n" \- ~! Q; t- r9 I S 1小時 2 ~- N, I' g3 z5 O & B# P, x" c4 E* ^; \# O/ ] % l; u9 M. e0 U% f8 { 3 k( t- U% D9 K0 p) ` " H3 Z/ r: E7 M: J" R ! Q- |6 n" @$ Z" W 2小時 ; X3 {/ o5 G/ f8 [ 6 ]- m' L3 j( M1 z |
歡迎光臨 Chip123 科技應用創新平台 (http://free.vireal.world/chip123_website/innoingbbs/) | Powered by Discuz! X3.2 |