If you have any trouble accessing any of these
materials, please reach out to Katrina (lacurts@mit.edu) for
help.
# | Title | Outline | Slides | Supplemental Reading |
1 | Modularity, Abstraction, and the Impact of Systems | Outline | All animations; limited animations | Textbook §1.1-1.5, §4.1-4.3 |
2 | Naming | Outline | All animations; limited animations | Textbook §2.2, §3.1 |
3 | Virtual Memory | Outline | All animations; limited animations | Textbook §5.1, §5.3, §5.4; Architecture review |
4 | Bounded Buffers and Locks | Outline | All animations; limited animations | Textbook §5.2; Atomic exchange |
5 | Threads | Outline | All animations; limited animations | Textbook §5.5, §5.6 |
6 | OS Structure, Virtual Machines | Outline | All animations; limited animations | Textbook §5.8 |
7 | OS Performance (Storage) | Outline | All animations; limited animations | |
8 | Intro to networking and layering | Outline | All animations; limited animations | Textbook §7.2 (book chapters 7-11 are online) |
9 | Network Layer: Routing | Outline | All animations; limited animations | Chapter 17 and Chapter 18 of the 6.02 notes |
10 | BGP | Outline | All animations; limited animations | BGP tutorial through Section 3.2 |
11 | Transport Layer: TCP | Outline | All animations; limited animations | Chapter 19 of the 6.02 notes. Note that the 6.02 reading uses slightly different ACKs than what we'll see in lecture. |
12 | In-network resource management | Outline | All animations; limited animations | |
13 | Application Layer | Outline | All animations; limited animations | This article is written by one of Akamai's founders and gives a very good overview of the content-distribution options; you'll be discussing a paper about Akamai in the next recitation. |
14 | Datacenters and Clouds | Outline | All animations; limited animations | |
15 | Reliability | Outline | All animations; limited animations | Textbook §8.1, §8.2, §8.3 |
16 | Transactions | Outline | All animations; limited animations | Textbook §9.1, §9.2.1, §9.2.2 |
17 | Logging | Outline | All animations; limited animations | Textbook §9.3 |
18 | Isolation | Outline | All animations; limited animations | Textbook §9.4 before §9.4.1, §9.5 |
19 | Distributed Transactions | Outline | All animations; limited animations | Textbook §9.6 |
20 | Replication | Outline | All animations; limited animations | |
21 | Intro to Security + Authentication | Outline | All animations; limited animations | Textbook §11.2 |
22 | Low-level attacks | Outline; Close-up recording of stack-smashing demos (This video is from a previous year. The slides look a little bit different, but the code and the demos are the same.) | All animations; limited animations | All of these readings are entirely optional: |
23 | Secure Channels | Outline | All animations; limited animations | Textbook §11.3-11.5 |
24 | ToR | Outline | All animations; limited animations | |
25 | Network Attacks | Outline | All animations; limited animations | |
26 | Wrap-Up | No outline | All animations; limited animations |