1 Fundamentals
% _& c. a6 H8 X0 [8 u1.1 Requirements of Networking
% i5 @! y+ Q* V1 _1.2 Underlying Principles
9 R1 U6 R1 o6 t" J* p- K+ A4 a1.3 The Internet Architecture
$ g" X5 U% E) M" v1.4 Open Source Implementations , A, R4 @0 _6 \2 A; T% U+ d: m7 U
1.5 Book Roadmap: A Packet’s Life
- v! G1 R7 n0 l3 ^" i, FAppendix B Linux Kernel Overview ; ?& T! ~/ o) i1 q x- U. H$ h
B.1 Kernel Source Tree % i% p8 k- Z# z/ L4 E
B.2 Source Code of Networking
! p2 U. |& S j% SB.3 Tools for Source Code Tracing
& O0 _( x, J& T4 g0 I' L& nAppendix C Development Tools
% K. Q% G/ |2 C* X+ ^C.1 Programming
- F$ }0 I: e: \# Z$ }C.2 Debugging
8 N1 _! K+ ~; o! V1 W* k+ F- {3 wC.3 Maintaining
. v+ d* W* _# ~" B- K8 QC.4 Profiling
) V! J; |- `- QC.5 Embedding 5 A( x$ b" J4 T6 v7 i2 C( C- d
Appendix D Network Utilities a% N5 ^" T8 K
D.1 Name-Addressing
8 O. c6 M6 \5 P' R; m+ {& FD.2 Perimeter-Probing
9 v4 z% j. `" [% mD.3 Traffic-Monitoring ; T n$ W. e- y9 E
D.4 Benchmarking
/ U9 c y/ t8 s& y6 ND.5 Simulation and Emulation
) Y1 L9 A! p. G* ^D.6 Hacking
" S7 y0 ]' _- M9 i5 O2 Physical Layer
! g3 U0 _" L) ]General Issues
. A% C& Z3 G3 H, z; x- \7 \Open Source Implementation 2.1: 8B/10B Encoder % T3 y9 h3 ?/ m2 z
Open Source Implementation 2.2: IEEE 802.11a Transmitter with OFDM 3 t9 \2 ?, m; m/ B) w) |2 Y
3 Link Layer
( x& X! X2 }2 D& _General Issues 2 S* `% o7 d, |' r
Open Source Implementation 3.1: Checksum : D D+ |4 a6 j' {
Open Source Implementation 3.2: Hardware CRC32 7 X2 o7 M- ~* l6 j" q/ S; U
Open Source Implementation 3.3: Link-Layer Packet Flows in Call Graphs
2 D' A2 }# H/ c' Q" e' \0 a; u& uOpen Source Implementation 3.4: PPP 8 z- C2 B3 V- e% A
Open Source Implementation 3.5: CSMA/CD ! U( i' N1 P4 x/ i4 y2 u
Open Source Implementation 3.6: IEEE 802.11 MAC Simulation with NS-2 8 k% j4 l8 X6 ]3 t! `+ T% S1 `9 H' Z
Open Source Implementation 3.7: Self-Learning Bridging ' ~3 q/ N( m2 R' n' J E
Open Source Implementation 3.8: Spanning Tree
" Q3 m) w7 Q8 e3 r) r8 Y. V8 JOpen Source Implementation 3.9: Probing I/O ports, Interrupt Handling and DMA ! |2 d& [! W, \+ u5 k
Open Source Implementation 3.10: The Network Device Driver in Linux : U* W' w% U* G6 S& w. r" e
4 Internet Protocol Layer
, B* o/ V& f7 h; Y6 N# hGeneral Issues
' Q3 N# a1 U( B. ROpen Source Implementation 4.1: IP-Layer Packet Flows in Call Graphs + m7 }6 Q r- _3 y+ f D' P
Open Source Implementation 4.2: IPv4 Packet Forwarding
# |. w2 _7 K3 m- D/ oOpen Source Implementation 4.3: IPv4 Checksum in Assembly 9 u# ^0 ~+ g/ h, G0 D% d8 f
Open Source Implementation 4.4: IPv4 Fragmentation
, i/ [6 z- U+ C5 n7 @4 {7 hOpen Source Implementation 4.5: NAT
2 i+ k, K/ R- {& E! JOpen Source Implementation 4.6: ARP " L1 Q2 o: _$ ]1 v6 F- D1 s
Open Source Implementation 4.7: DHCP ) T _; E. e6 Y$ Q/ r$ c
Open Source Implementation 4.8: ICMP 6 [2 _# X% m* R
Open Source Implementation 4.9: RIP
8 d2 n+ k7 T3 S* Q, }- ?Open Source Implementation 4.10: OSPF : f! \) Q: s& c0 B8 g, O
Open Source Implementation 4.11: BGP * ?# { z$ K) w8 j& F. O/ b
Open Source Implementation 4.12: Mrouted
1 N$ y5 n4 j0 b' ^3 J* R' a9 j1 g5 Transport Layer
! ~+ l3 Z* w# b; {: X6 p: ]7 XGeneral Issues 8 {% b: d/ B) b' g1 i
Open Source Implementation 5.1: Transport-Layer Packet Flows in Call Graphs 9 k1 ?$ z$ r8 n7 W- {8 W- S
Open Source Implementation 5.2: UDP and TCP Checksum / o) M' y$ }- F5 }+ s# q
Open Source Implementation 5.3: TCP Sliding Window Flow Control
/ \, C6 n5 p# C; JOpen Source Implementation 5.4: TCP Slow Start and Congestion Avoidance
" I! G' G$ A; J! l0 |% l, qOpen Source Implementation 5.5: TCP Retransmit Timer 2 B8 X7 r1 t# U
Open Source Implementation 5.6: TCP Persistence Timer and Keepalive Timer / n$ @4 g- @6 B- i
Open Source Implementation 5.7: Socket Read/Write Inside out & Z9 l$ z( L6 l: D# K
Open Source Implementation 5.8: Bypassing the Transport Layer " u0 F2 R" ^% i6 K, f* }* I! `$ S
Open Source Implementation 5.9: Making Myself Promiscuous + w, f2 n8 W/ `% b4 C4 m
Open Source Implementation 5.10: Linux Socket Filter
+ E3 C+ d, [8 a, ^5 ]+ E/ e6 Application Layer % V6 K: q' T0 b. Q* Y9 h* [
General Issues ; \$ ~! Y: ? h# E
Open Source Implementation 6.1: BIND : U7 z6 v8 F- X( Q4 M+ E0 P5 k |
Open Source Implementation 6.2: qmail 0 |9 l5 U9 A9 {2 d
Open Source Implementation 6.3: Apache
4 `! y/ ~6 g% A1 z6 vOpen Source Implementation 6.4: wu-ftpd
9 `$ S+ r. ]! l0 VOpen Source Implementation 6.5: Net-SNMP
/ T2 a9 c1 u7 S8 C. k6 GOpen Source Implementation 6.6: Asterisk
$ A5 r4 E) I: G' x- ~! I4 ]9 s. a0 {Open Source Implementation 6.7: Darwin
D4 ^& f1 A: |" a" v2 h* y* `Open Source Implementation 6.8: BitTorrent
1 Q# t/ U- p; a7 Internet QoS ; ]3 g9 N9 M7 k( K
General Issues 0 o6 B) Z) _3 A
Open Source Implementation 7.1: Traffic Control Elements in Linux
/ w6 W3 s$ y# ?6 d) V6 mOpen Source Implementation 7.2: Traffic Estimator . w5 o. X1 |' F0 ~, w4 g2 [6 G& ?# u. H
Open Source Implementation 7.3: Flow Identification
0 r" z# D) a) NOpen Source Implementation 7.4: Token Bucket ; ~$ |& g6 e* W8 S/ W/ ~
Open Source Implementation 7.5: Packet Scheduling
) f0 X# @: y& C, z. AOpen Source Implementation 7.6: Random Early Detection (RED)
. s( T1 f T3 Z1 `" i7 I8 Network Security # c& E. |0 H% R, e8 Z
General Issues 2 |4 }. ]# v8 Q/ @1 x
Open Source Implementation 8.1: Hardware 3DES
2 D4 Z$ I0 s% h- U6 eOpen Source Implementation 8.2: MD5 / y+ v* G4 j- i- ?: p1 `4 U5 e
Open Source Implementation 8.3: AH and ESP in IPSec 4 M% b' Y9 }5 t% x5 W. M
Open Source Implementation 8.4: Netfilter and iptables 0 \" y! U8 K$ i0 n! \
Open Source Implementation 8.5: FireWall Toolkit (FWTK)
+ S2 j( x* X! g ~8 Z" AOpen Source Implementation 8.6: ClamAV
+ a9 d7 C" J' }4 e2 q. W/ nOpen Source Implementation 8.7: Snort ! V9 E4 D/ M1 W
Open Source Implementation 8.8: SpamAssassin ) b7 M. k. F3 {% l
| 2小時
$ Y7 J- u* s8 Y
0 D: _' }0 T6 L3 F4 r. F; C5 g5 p1 Y3 F* q9 A
2 \* A- {1 s/ k! [
# T& x! u+ M/ Y: Y3 q* {1 A7 g3 c' |
0.5小時 ( F4 _. \2 A/ X/ G7 M! m. K( f
- H l+ j5 ] L4 y
9 ]4 x8 B) ~8 O- T% I% H
: d% l1 s4 ~1 M( _; B1 S$ a0.25小時
7 ~1 q1 \1 ]4 W# b4 T9 W* `) D" x4 X
8 h" r! z1 ], ^4 q7 P3 {/ G0 @6 D1 S
8 ?' q! X- |6 j: a1 J! b# {' ~2 t/ K2 x6 ]* E6 u3 {, j9 [4 E
0.25小時
: ]9 t( n6 Y: V+ o% Z: F. h9 d
9 l( L! y" U4 `5 E" J# \2 T9 U8 R3 y# L* L$ H
+ k2 q8 \6 X" W2 O! C& d. x7 A1 Z3 v7 A( {5 C: d
9 V( Z( M+ g# {8 Q7 A' S% `% ^0 m
" U) C6 r2 Z) a: Q0 G
0.5小時
3 M, E. }2 h8 F5 t! `' W
; @* }/ y3 u; N; ?9 j) J
d. J. K" e3 I1 F' B0 j+ Z2 {! Z8 a1 d1 [% I Z" b
1小時
( ]$ j* W$ D! i4 w4 u7 D
0 n; y( L( r- ~# G9 x9 c; ^
# B4 i1 ^# V- J$ \1 @5 |9 _2 {8 E( G- A# b7 F4 o8 e+ D
3 Y* V! F1 c; d6 ]& ~! r
' I+ {$ J3 B3 x* V7 ?3 L- o" _# e5 Q- x2 W# ]1 z6 _) x$ Z5 r/ s( l
) k4 c8 ]# N4 D$ i: H; O; l( u
# A% Z+ p3 E3 {
% R" h+ S; q4 E T# H
; Z8 A& {" R0 i( t- @3 g4 F- {9 w! L1 r/ m
1 A v( |, j: r. h
1.5小時 5 ^' u4 `) u( e7 r
+ b$ ~' E4 j" m. W% k; v
( D$ x. ~- b. C# t. X1 j( D( j
& X1 D3 n$ J4 R& i3 U+ p% N2 l, k" f+ w w
! z0 N% T1 C N, Y& l6 @/ G
7 P# l) B' X6 ]4 _2 h2 ~. Y. r
' [8 _3 z! S# `" L4 \- L
/ d6 y. H E% y! V" m2 s6 N# u
1 k# O- Z* e- T$ r! X( b6 m7 Z3 \0 O
5 H9 }$ {! {0 }5 Q
- ?4 v# p) Q2 f5 E4 R7 e, s# C. \. j' ]- O" H9 o7 K
( G9 g2 p4 C7 ]
1小時 : T, W# U, m: _8 a% X- [" E
1 {6 @0 o) h" `& Z
. Y+ y. w6 A) T2 q
4 Q0 o: W6 @( S- m
g: Y& F+ k8 O; Z: A2 r. s3 C, ^3 ^9 P( ]+ F5 n
( ~1 a& y7 T, ^. C1 `1 S8 r( F: k5 }
# y7 d% ~0 P$ y! g) _. u' E- O* W* k+ }, e" a
! W+ ~" q: G+ j8 Z
7 D4 i. L. B) ~
! Q3 v" u( H: a- s a3 L4 B6 Z7 z! I2 S8 ^
2小時 . G" B9 E+ K9 s! F: T0 a- r% k
& { q+ g) u! V6 M' G
( K0 H- Q) D4 Y! C
- m) h' G& a( w1 A- N3 ?; `; F1 B4 Q
4 v( B. b& ~* _" f7 s6 w& m" Z; G" n) T l6 P- a Z- L9 A
5 A3 J4 e f$ m; l5 B. H% A% F8 n1 ` M. n* D, L% B) z: B0 F
8 |+ _- I4 ~+ L7 W3 c2 f" w" e
1小時 a% n( C k" P( C0 w$ q
5 N0 B8 b/ V; m
0 x* Y. m0 a; [- l
) L; z1 `, {6 B
5 E: ^- r7 m+ Z# C; G9 |' O% ]
T% B8 p7 H' a+ y% D+ ~3 }( @4 l% M5 z: ^7 k4 Z
2 h5 g; i e# D, t! C& R. w
2小時
3 M. T9 ]& {, M& d6 A
# I) C3 U1 N. t) J' p7 U7 \4 k |