ses # | Topics | videos |
---|---|---|
R1 | Worse is Better | |
L1 | Introduction to Systems | |
R2 | The Architecture of Complexity | |
L2 | Complexity in Computer Systems | |
R3 | Therac-25 | |
L3 | Abstractions | |
R4 | UNIX® (Ritchie and Thompson) | |
W1 | Writing Program Lecture | |
L4 | Naming (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R5 | More UNIX® | |
L5 | Fault Isolation with Clients and Servers (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R6 | X Window System | |
T1 | Design Project 1 Introduction | |
L6 | Virtualization (PDF) Virtual Memory | (RM - 56K) (RM - 80K) (RM - 220K) |
L7 | Virtual Processors: Threads and Coordination (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R7 | Flash Web Server | |
T2 | Design Project 1 Discussion | |
L8 | Performance (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R8 | MapReduce | |
L9 | Introduction to Networks (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R9 | Ethernet | |
Q1 | Quiz 1: Material through R8 | |
L10 | Layering and Link Layer (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R10 | End-to-end Arguments | |
L11 | Network Layer, Routing (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R11 | Internet Routing | |
T3 | Design Project 1 + Writing | |
L12 | End-to-end Layer (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R12 | NFS Protocol (first five pages) | |
L13 | Congestion Control (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R13 | NATs | |
L14 | Distributed Naming (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R14 | 9/11 | |
L15 | Reliability (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R15 | Fault-tolerance War Stories | |
L16 | Atomicity Concepts (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R16 | LFS | |
L17 | Recoverability (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R17 | System R | |
T4 | Tutorial | |
L18 | Isolation (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R18 | More System R + Chocolate | |
L19 | Transactions and Consistency (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R19 | Unison | |
Q2 | Quiz 2: Material from L9 through R15 | |
L20 | Multi-site Atomicity (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R20 | Durability | |
T5 | Tutorial | |
L21 | Security Introduction (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R21 | Security War Stories | |
L22 | Authentication (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R22 | Trusting Trust | |
L23 | Authorization and Confidentiality (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R23 | Why DO Cryptosystems Fail? | |
R24 | Slammer and DoS | |
L24 | Advanced Authentication (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
R25 | Design Project 2 Presentations | |
L25 | Complex, Trusted Systems (PDF) (Guest Lecture by Professor Hal Abelson) | (RM - 56K) (RM - 80K) (RM - 220K) |
R26 | Hints for System Design | |
Q3 | Quiz 3: Material from L16 through R26 |