Chip123 科技應用創新平台

標題: 8/15、16「計算機網路-開放源碼導向」短期課程 [打印本頁]

作者: mister_liu    時間: 2011-8-2 02:08 PM
標題: 8/15、16「計算機網路-開放源碼導向」短期課程
為何通訊協定是以這種特殊方式設計而成的背後原因比通訊協定如何運作來得更重要,本課程將解釋協定的行為,並同時傳達關鍵概念和基層原理。為了進一步彌補設計和實作之間長久以來的落差,以Linux系統為例,說明了在系統裡何處以及如何實作通訊協定的設計。透過一組全方面且實際運作中的56個開放源程式碼之實作,其範圍橫跨了硬體(8B/10B、OFDM、CRC32、CSMA/CD及crypto)、驅動程式(Ethernet和PPP)、系統核心(Longest Prefix Matching、Checksum和、NAT、TCP Congestion Control、socket、shaper、scheduler、firewall及VPN)以及Daemon(RIP/OSPF/BGP、DNS、FTP、SMTP/POP3/IMAP4、HTTP、SNMP、SIP、streaming、及P2P)。本課程將計算機網路原48小時課程濃縮於兩天12小時,特別適合網路產業之研發工程師或資訊電機相關科系有基礎網路概念的學生。
7 S* L8 \4 _2 i- a4 A/ x6 j5 V6 F/ c% u  P& H" A9 ]! S. @
師資:林盈達教授 /交通大學資訊工程系教授
3 X  O- W" R8 d$ ]) C. o1 t0 V課程時間與地點:100年8月15日、16日上午9時至下午4時於淡江大學台北校園(台北市大安區金華街199巷5號,近永康街
' X! u; S) W# [, S報名方式:
1 w2 h/ `8 E4 c; E5 F% O& J1.     線上註冊http://www2.tku.edu.tw/~fa/online.htm
; [3 s/ _% C, ^' k2.     學費及繳費:2,600元(含補充講義200元;不含教科書費)9 ?- ^9 C) x9 G, _
        ATM或匯款:戶名:財團法人私立淡江大學,帳號:第一銀行信義分行162-10-004528。1 f1 U9 c+ z  U$ a2 `9 T# s1 O
3.     前述1、2項均完成方為報名完成。
0 T6 j7 g  }6 ], P9 v$ f# B3 H! v  [- Z8 H
招收名額:; ]5 h8 k. l) F5 s& t: s6 u
●實體班名額50名:傳統面授課程。
, n; Z3 Q$ F# J' ~; w  h  s; o●如無法配合上課地點請選:同步即時網路班名額150名:網路線上即時授課。: Q" m, ^# B0 g' C" ~) R- _$ i' R" @- L
●如無法配合上課時間請選:非同步網路班名額300名:100年8月18日至9月2日任何時間均可。
6 _* u1 G. M, d: z: Q教科書:Computer Networks: An Open Source Approach. 開發圖書,訂價1,050元﹝團購九折﹞。自由購買。3 M% u+ p7 @( G+ p9 n' q; e; ~
證書:完成課程且出席率達三分之二者,發給推廣教育證明書。
作者: mister_liu    時間: 2011-8-2 02:09 PM
課程大綱:
) H4 q0 L4 U6 F/ [4 H9 \$ E- Q
1 Fundamentals
; }! b, V$ ?% J* o; ?1.1 Requirements of Networking   L9 \9 t/ h2 N6 \
1.2 Underlying Principles
9 Q2 \. n5 H) b+ d1.3 The Internet Architecture 4 Y% B- M9 e& U+ p& i
1.4 Open Source Implementations
, [1 e) q$ T8 R- ]" A# Q5 Q1.5 Book Roadmap: A Packet’s Life
' I! Q7 m% |- O+ h$ @Appendix B Linux Kernel Overview
+ Y/ L8 o' q6 ]8 BB.1 Kernel Source Tree
' c+ a0 [2 @$ e  \' Z; tB.2 Source Code of Networking : y; c+ Q! c+ W0 N! j. [2 i! t
B.3 Tools for Source Code Tracing % u$ l& _& L0 Y7 |: g
Appendix C Development Tools " R# ]9 i" _- }2 W; _( r
C.1 Programming
; q  k  @! p! y' b# JC.2 Debugging ' T1 h$ z# g% m! w7 u3 `
C.3 Maintaining
2 b& Z# @& F, @C.4 Profiling
: T- }! V* W: C0 `9 g' h  {$ aC.5 Embedding ) K0 g0 o! v0 d* j- u9 R2 |
Appendix D Network Utilities / Z* ~9 p. m! ?* |4 [2 q
D.1 Name-Addressing 6 B; U9 W5 u- m/ y  x' }4 X$ O
D.2 Perimeter-Probing
) B* f3 D) ~$ h% ?8 S5 OD.3 Traffic-Monitoring ; F" I! i  ?, G% g9 e+ Q
D.4 Benchmarking
  Q- v$ S# n, PD.5 Simulation and Emulation
8 a" m+ u$ n" I1 N& u) AD.6 Hacking
0 ]* o* C6 P2 q2 Physical Layer
5 ]4 [$ f" C; [' G4 |! \General Issues
6 Q3 A" h+ E0 }Open Source Implementation 2.1: 8B/10B Encoder ! P: ^; c2 M  d9 o( B& v1 n
Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM
, Z% C! L% g9 {% z3 Link Layer ; c. w8 x- [, P) y3 P* d
General Issues # m9 a( a/ |$ C7 h+ q# L& s
Open Source Implementation 3.1: Checksum # T, a2 ^1 E1 S) Y
Open Source Implementation 3.2: Hardware CRC32 - H6 S0 {& t7 c
Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs 6 i9 C+ O1 p6 ?: G: N
Open Source Implementation 3.4: PPP 4 _+ }  V1 g0 j
Open Source Implementation 3.5: CSMA/CD
/ G; u: Q7 u( S: r! w1 @Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 4 o8 {) ]' q! j4 {9 B0 h9 y( G' H# a
Open Source Implementation 3.7: Self-Learning Bridging , B$ Q) E! {! V, _1 `5 T
Open Source Implementation 3.8: Spanning Tree 4 ^& y3 e8 \$ B, q0 G0 a
Open Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA
9 O# n' V) t/ [3 ]8 J# T9 y9 BOpen Source Implementation 3.10: The Network Device Driver in Linux
  ]  G5 x- r$ f3 [& O4 Internet Protocol Layer 1 T7 |9 P( L7 Y/ w) |
General Issues
3 F! L3 s  o& C6 M  i! n7 cOpen Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs 8 w* m. Z" J; x$ ~) ?8 Z
Open Source Implementation 4.2: IPv4 Packet Forwarding
  v6 r0 {0 U) p0 Z8 e. |; `* kOpen Source Implementation 4.3: IPv4 Checksum in Assembly $ F, _( X! ?4 j. U- U; ]
Open Source Implementation 4.4: IPv4 Fragmentation . V  n+ X7 p9 d+ o2 \
Open Source Implementation 4.5: NAT
% E5 \; s+ w0 f1 u; pOpen Source Implementation 4.6: ARP 4 l& H) `1 f$ {  _' g
Open Source Implementation 4.7: DHCP * Y  b# n5 D1 {  A' x7 X
Open Source Implementation 4.8: ICMP   v6 ?8 B% o' V6 v7 M
Open Source Implementation 4.9: RIP
' f" E* K1 i# Q/ v. XOpen Source Implementation 4.10: OSPF
7 ~5 ~" x4 V: S- wOpen Source Implementation 4.11: BGP
0 g9 C# }0 O3 n9 Z+ [) mOpen Source Implementation 4.12: Mrouted 8 n0 M3 i# s8 q1 c, c, s' |2 \
5 Transport Layer
  \  N7 Z, y- |3 a$ Q6 U' \General Issues ; E( c4 q/ F0 l, E. n( x4 z
Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs
; o$ L, O/ `& Q% Y- w* M  R4 V& \Open Source Implementation 5.2: UDP and TCP Checksum # X* t8 a% k5 f) }- J8 |) U
Open Source Implementation 5.3: TCP Sliding Window Flow Control 5 H# `1 j" ]/ ?" V/ K8 K) |
Open Source Implementation 5.4: TCP Slow Start and Congestion Avoidance ; v5 _% h0 m# B# q
Open Source Implementation 5.5: TCP Retransmit Timer
3 ~& q. B; K! x* z+ _8 `9 P$ VOpen Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer
& ?# `4 b% [+ r2 G6 q$ R* S- nOpen Source Implementation 5.7: Socket Read/Write Inside out 3 Z. B* r" h1 s. A6 D
Open Source Implementation 5.8: Bypassing the Transport Layer
# \1 D0 c9 `# M+ W% `' M0 [5 p5 g9 zOpen Source Implementation 5.9: Making Myself Promiscuous 6 c, N3 s) B& n# R- C2 R; ?2 i
Open Source Implementation 5.10: Linux Socket Filter
7 E+ O6 {2 `1 o. |# @6 Application Layer
+ t# {5 x' g" C( B6 ^( oGeneral Issues
0 b4 s0 y4 g0 K  G) cOpen Source Implementation 6.1: BIND
8 }5 c. @  ]) H: l( N+ COpen Source Implementation 6.2: qmail 9 J% o; b% N; L8 [
Open Source Implementation 6.3: Apache / b$ l5 S0 S# P% M4 f) {, O
Open Source Implementation 6.4: wu-ftpd
3 o- Z  s2 A8 m4 b, }2 C, L  VOpen Source Implementation 6.5: Net-SNMP
% g, R8 n  _/ f7 q% U' g2 z+ UOpen Source Implementation 6.6: Asterisk
) f6 R3 L2 k# C) h9 |& [Open Source Implementation 6.7: Darwin
. f9 M  }. L6 [Open Source Implementation 6.8: BitTorrent
6 t; a) D. r4 A) w: j7 Internet QoS
0 d. z2 _( p; fGeneral Issues # \/ |/ }( H# L$ O8 N7 O1 ^, A  ~
Open Source Implementation 7.1: Traffic Control Elements in Linux
5 |5 e- A, Z0 N' q: ^  V- z. kOpen Source Implementation 7.2: Traffic Estimator
% f; D) o" X  I9 YOpen Source Implementation 7.3: Flow Identification # t2 l3 ]; s# Z2 `
Open Source Implementation 7.4: Token Bucket
4 f4 ]; b* `# F7 M) l; ^Open Source Implementation 7.5: Packet Scheduling
' E/ O3 i' r' s. w& ]0 mOpen Source Implementation 7.6: Random Early Detection (RED) 2 S3 N' @# _4 q6 u0 E! e: |
8 Network Security
/ G: G# u, R9 x' |General Issues
! k- ]6 I" R4 u7 I+ x1 e/ q' WOpen Source Implementation 8.1: Hardware 3DES 4 m  C, Z1 q& l( M
Open Source Implementation 8.2: MD5 ( g/ I7 Z4 p( b$ p' u2 }9 t
Open Source Implementation 8.3: AH and ESP in IPSec
, {) v/ ?5 |; G! cOpen Source Implementation 8.4: Netfilter and iptables
6 I5 j% G, T+ H/ oOpen Source Implementation 8.5: FireWall Toolkit (FWTK)
: o, I7 Z8 i: U% bOpen Source Implementation 8.6: ClamAV
/ V  h4 Q2 z) {  u" H: N; \! OOpen Source Implementation 8.7: Snort
. S5 `/ v) O& y. xOpen Source Implementation 8.8: SpamAssassin 4 L5 P5 b/ o/ l+ f) g1 v
2小時 , h" Y; q0 l, J& f" ~; E* A1 {9 ?
0 L9 ?) |( h3 [( n5 x. ~
# a: y+ a. I$ o6 w% j
* y0 E* G- L! Z8 y$ i8 u6 f, S
+ d. i: a: K8 K+ K6 q; H# q

9 ?0 Q; n5 I- r+ y0 y0.5小時
- ?! q& G9 T2 v! s7 x
: J, j) v2 S$ b* m: J; y5 a- N/ ~; R+ X+ y4 q7 H- B6 P
# c# {* h  ~) [+ c
0.25小時 , C2 n4 i% I8 w
- z' p& N, [4 [5 }

: T2 v8 _! b% g0 m; s
& c: G3 S5 T. C1 f; x2 r8 @: |  n) |: v$ m/ K: U4 I
4 Q1 H' I( B# K7 s  ?2 O4 F
0.25小時
8 y4 ?* _. Q" {
" _5 [4 B7 W, L$ G, @+ B' x8 c+ b) j

3 i5 G' E+ V) V  z- Z0 }! J; N
& H& y$ ]% b1 b4 i, N' C9 r
9 ?2 a" r9 Z3 f* M- a* H
; I$ `, Z" z- ~0 T0 q+ n% R& o! T0.5小時
9 [) o, Z2 M/ w) g
3 m: [0 [& A7 c: Q% n1 w; `3 n. R) k, C! B0 x7 Z
: c' _1 o$ Z& l  A# a
1小時
* ]2 A9 I; b; a% `4 ~4 C& d
- j$ A7 k5 U0 v% v9 H. O3 d  d+ x+ B" d  e  l8 _
9 _; F- _# @. J0 T) p

' N/ E6 T: k! ^9 K/ A7 c3 K& W" z
8 D) {# d! [. Z4 h& T
  V& K$ J* K- {8 E- C0 [3 ~0 c* c# w

4 U1 M7 R& ?' V. o! v# T/ `6 b! n4 H: ?+ _

# Y: Q$ d# t# }/ z, D0 W1 r6 D6 g5 C
7 v# I! R. Y. r" P
1.5小時 # `% J$ b- N# t, [  `, p

: G* {+ m& O& a& c
2 e  u, d5 e) h- d$ f4 y' I& c  g1 w; h+ F3 E* v! E
( i& o$ u) Z6 |7 b& Y
& r& b, |) Y- d7 H
2 D, `. t1 T: J: u0 x

( C* R  {* c3 I7 ?5 l2 _
% o, W5 [% w! G2 y& S: m* }+ a4 f/ }3 R
& m% m$ B- A& ]( k, |6 F/ N% n: {

) X( d2 i$ B5 |
/ m# e) [' C# W; u  N, i" l4 a5 I9 M
1小時
) a1 j1 F. w. _; A+ K
* ]: w: N8 _2 }( z5 W
6 b4 b# ]1 v2 l5 U+ J
3 j+ O% G; N! ~$ E5 M- P. {1 C
2 t+ i( L4 p& R# A. W' |( T. E; d( o  L

) Q- U1 Q* h8 _+ G" z7 h% e4 J  a* k/ c4 L+ X
9 h+ C1 G$ S# P* t, z. H0 C" n% E
& w# u" B9 b# M' O

  F+ x' G8 o, A" U
; b! x! {& }5 G7 ~, a: l+ ~" F0 C; X6 }' y+ \/ s$ F  u
2小時
3 N& n: X7 u. m2 s  N  D% b4 l6 v1 @1 n% U
, J; z  s$ R! {  }
1 E7 u4 n6 p8 `2 s+ w* _
0 w9 |! o( t2 `6 H* k# k8 u5 U* W9 [

' w1 P" S. f$ F( B
1 [# X0 a2 f) D  O+ E" G3 C/ U: t  U, c$ H  [8 ?3 I9 Z% I
" g/ p$ a. l3 L. t7 W0 ?" v
' n" \- ~! Q; t- r9 I  S
1小時
+ r# d' j/ |" L8 |1 p0 L
$ L4 s# K7 ?! d! p8 z5 E2 ~- N, I' g3 z5 O
& B# P, x" c4 E* ^; \# O/ ]
% l; u9 M. e0 U% f8 {
3 k( t- U% D9 K0 p) `
" H3 Z/ r: E7 M: J" R
! Q- |6 n" @$ Z" W
2小時 ; X3 {/ o5 G/ f8 [
6 ]- m' L3 j( M1 z





歡迎光臨 Chip123 科技應用創新平台 (http://free.vireal.world/chip123_website/innoingbbs/) Powered by Discuz! X3.2