Date
|
Topics Covered
|
PDF |
PPTX |
Reading |
1/20
|
1.
Intro: What's an O/S?
|
pdf |
pptx |
Chapter 1 |
1/22
|
2.
The O/S runs the hardware. A quick hardware review
|
pdf |
pptx |
(From CS3610) |
1/27
|
3.
O/S structure, process abstraction
|
pdf |
pptx |
Chapter 2, 3 |
1/29
|
4.
Threads, concurrency
|
pdf |
pptx |
Chapter 4, 6.2,
|
2/03
|
5.
Synchronization primitives and issues
|
pdf |
pptx |
6.3-6 |
2/05
|
6.
Monitor-style synchronization
|
pdf |
pptx |
6.7 |
2/10
|
7. A monitor example. Then: CPU
Scheduling
|
pdf |
pptx |
Chapter 5 |
2/12
|
8.
Deadlocks (part I)
|
pdf |
pptx |
7.1-7.4 |
2/17
|
9.
Deadlocks (part II)
|
pdf |
pptx |
7.5 |
2/19
|
10. Memory management (part I: Segmentation, paging)
|
pdf |
pptx |
Chapter 8, 9.1-5 |
2/24
|
11. Memory management (part II: Working Sets)
|
pdf |
pptx |
Chapter 9 |
2/26
|
Prelim 1: In class, covers material from 1/20-2/17.
|
|
|
|
3/3
|
12.
Putting it all together: How DLLs work
|
pdf |
pptx |
Chapter 8.1.5 |
3/5
|
13.
File Systems: Basic ideas
|
pdf |
pptx |
Chapter 10 |
3/10
|
14.
File systems: Disk representation
|
pdf |
pptx |
Chapter 11 |
3/12
|
15.
File systems: NFS and GFS
|
pdf |
pptx |
Chapter 17 |
3/17
|
No class: spring break
|
|
|
|
3/19
|
No class: spring break
|
|
|
|
3/24
|
16.
Internet Architecture: IP, DNS, Firewalls, NATs.
End to end principle
|
pdf |
pptx |
Chapter 16 |
3/26
|
17. Internet Architecture: TCP, UDP.
|
pdf |
pptx |
Chapter 16 |
3/31
|
18.
Service oriented architectures, web services, Javascript, issues.... |
pdf |
pptx |
Wikipedia |
4/2 |
Prelim II: In class, cumulative through 3/26 (inclusive) |
|
|
|
4/7 |
19.
Public (Asymmetric) Key Cryptography. Symmetric Key Cryptography |
pdf |
pptx |
Chapter 15 |
4/9 |
20.
Pfishing, Spoofing, In-Flight Page Editing, other tricks |
pdf |
pptx |
Chapter 15. Wikipedia |
4/14 |
21.
Virtual machines. Paravirtualization. |
pdf |
pptx |
Chapter 2.8. Paper: Xen and the Art of Virtualization |
4/16 |
22.
The trend towards consolidation. Ecological concerns and
considerations |
pdf |
pptx |
Energy Efficiency Materials |
4/21 |
23.
Dangers of IT Monocultures. Synthetic diversity. |
pdf |
pptx |
The Monoculture risk put into context. (Schneider and Birman; IEEE
Security and Privacy; 2009). |
4/23 |
24. Virtualization as a defensive technique: Honeyfarms, Vigilante |
pdf |
pptx |
Scalability, Fidelity,
and Containment in the Potemkin Virtual Honeyfarm (Savage et. al, SOSP
2005).
Vigilante:
End-to-End Containment of Internet Worms. (Costa et. al; SOSP
2005) |
4/28 |
25.
Component Architectures: Jini and .NET |
pdf |
pptx |
Chapter 22 |
4/30 |
26.
Live Objects |
pdf |
ppt |
http://liveobjects.cs.cornell.edu |