If you have any trouble accessing any of these
materials, please reach out to Katrina (lacurts@mit.edu) for
help.
| # | Title | Outline | Slides | Supplemental Reading |
| 1 | Modularity, Abstraction, and the Impact of Systems | Outline | All animations; limited animations | Textbook §1.1-1.5, §4.1-4.3 |
| 2 | Naming | Outline | All animations; limited animations | Textbook §2.2, §3.1 |
| 3 | Virtual Memory | Outline | All animations; limited animations | Textbook §5.1, §5.3, §5.4; Architecture review |
| 4 | Bounded Buffers and Locks | Outline | All animations; limited animations | Textbook §5.2; Atomic exchange |
| 5 | Threads | Outline | All animations; limited animations | Textbook §5.5, §5.6 |
| 6 | OS Structure, Virtual Machines | Outline | All animations; limited animations | Textbook §5.8 |
| 7 | OS Performance (Storage) | Outline | All animations; limited animations | no reading |
| 8 | Intro to networking and layering | Outline | All animations; limited animations | Textbook §7.2 (book chapters 7-11 are online) |
| 9 | Network Layer: Routing | Outline | All animations; limited animations | Chapter 17 and Chapter 18 of the 6.02 notes |
| 10 | BGP | Outline | All animations; limited animations | BGP tutorial through Section 3.2 |
| 11 | Transport Layer: TCP | Outline | All animations; limited animations | Chapter 19 of the 6.02 notes. Note that the 6.02 reading uses slightly different ACKs than what we'll see in lecture. |
| 12 | In-network resource management | Outline | All animations; limited animations | no reading |
| 13 | Application Layer | Outline | All animations; limited animations | This article is written by one of Akamai's founders and gives a very good overview of the content-distribution options; you'll be discussing a paper about Akamai in the next recitation. |
| 14 | Datacenters and Clouds | Outline | All animations; limited animations | no reading |
| 15 | Reliability | Outline | All animations; limited animations | Textbook §8.1, §8.2, §8.3 |
| 16 | Transactions | Outline | All animations; limited animations | Textbook §9.1, §9.2.1, §9.2.2 |
| 17 | Logging | Outline | All animations; limited animations | Textbook §9.3 |
| 18 | Isolation | Outline | All animations; limited animations | Textbook §9.4 before §9.4.1, §9.5 |
| 19 | Distributed Transactions | Outline | All animations; limited animations | Textbook §9.6 |
| 20 | Replication | Outline | All animations; limited animations | no reading |
| 21 | Intro to Security + Authentication | Outline | All animations; limited animations | Textbook §11.2 |
| 22 | Low-level attacks | Outline; Close-up recording of stack-smashing demos (This video is from a previous year. The slides look a little bit different, but the code and the demos are the same.) | All animations; limited animations | All of these readings are entirely optional: |
| 23 | Secure Channels | Outline | All animations; limited animations | Textbook §11.3-11.5 |
| 24 | ToR | Outline | All animations; limited animations | no reading |
| 25 | Network Attacks | Outline | All animations; limited animations | -->no reading |
| 26 | Wrap-Up | No outline | All animations; limited animations | no reading |