6.033

Lecture Notes

Disclaimer // Notes

------------

Disclaimer

These lecture notes are just that--notes. They do not replace any of the readings or the lectures themselves. The best way to treat them is as a high-level summary; the actual lectures went more in depth (explained the examples, for instance) and contained other information.

The notes were written by me (Frans Kaashoek) as an aid for myself. You may find them hard to understand, so if you get confused, just ignore them. If you find them useful, good for you. In short, there are no guarantees on the correctness or quality of these notes.

The lectures are influenced by other lectures and instructors who have taught 6.033 in the past. In particular, Jerry Saltzer should be credited for many ideas and notes in 6.033; he has been the brain behind 6.033 for most of the last 25 (or more) years. Also, many thanks to Ed Kohler for making sure that the notes are readable. Any errors are, of course, my responsibility.

If you have any comments, please send them to me.

------------

Notes

Choosing "[PS]" will fetch a PostScript version of the notes. They are also available in HTML, by choosing the name of the notes.

These notes are only accessible within MIT. Please do not distribute them. They are also available in the 6.033 locker; see /mit/6.033/lecnotes/.

[PS]  Notes-1: System complexity (2/7)
[PS]  Notes-2: 6.033 lessons (2/10)
[PS]  Notes-3: Client/server and RPC (2/12)
[PS]  Notes-4: Virtual Memory (2/18)
[PS]  Notes-5: Threads (2/19)
[PS]  Notes-6: Concurrency (2/24)
[PS]  Notes-7: Networking overview (2/28)
[PS]  Notes-8: Networking: Layering (3/3)
[PS]  Notes-9: Networking: Link and Network Layers (3/8)
[PS]  Notes-10: Networking: End-to-end Layer (3/10)
[PS]  Notes-11: Naming Overview (3/12)
[PS]  Notes-12: Naming Networks (3/17)
[PS]  Notes-13: Security: Encryption (3/19)
[PS]  Notes-14: Security: Authentication (3/31)
[PS]  Notes-15: Security: Authorization (4/2)
[PS]  Notes-16: Security: Certification (4/7)
[PS]  Notes-17: Storage Introduction (4/9)
[PS]  Notes-18: I/O Bottleneck (4/14)
[PS]  Notes-19: Distributed File Systems (4/16)
[PS]  Notes-20: Fault-tolerant Computing (4/23)
[PS]  Notes-21: Transactions (4/28)
[PS]  Notes-22: Implementing Transactions (4/30)
[PS]  Notes-23: Modular Transactions (5/7)

All lecture notes © 1997 M. Frans Kaashoek. Do not redistribute in any form.

------------

Top // 6.033 home