| ses # | Topics | videos |
|---|---|---|
| R1 | Worse is Better | |
| L1 | Introduction to Systems | |
| R2 | The Architecture of Complexity | |
| L2 | Complexity in Computer Systems | |
| R3 | Therac-25 | |
| L3 | Abstractions | |
| R4 | UNIX® (Ritchie and Thompson) | |
| W1 | Writing Program Lecture | |
| L4 | Naming (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R5 | More UNIX® | |
| L5 | Fault Isolation with Clients and Servers (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R6 | X Window System | |
| T1 | Design Project 1 Introduction | |
| L6 | Virtualization (PDF) Virtual Memory | (RM - 56K) (RM - 80K) (RM - 220K) |
| L7 | Virtual Processors: Threads and Coordination (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R7 | Flash Web Server | |
| T2 | Design Project 1 Discussion | |
| L8 | Performance (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R8 | MapReduce | |
| L9 | Introduction to Networks (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R9 | Ethernet | |
| Q1 | Quiz 1: Material through R8 | |
| L10 | Layering and Link Layer (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R10 | End-to-end Arguments | |
| L11 | Network Layer, Routing (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R11 | Internet Routing | |
| T3 | Design Project 1 + Writing | |
| L12 | End-to-end Layer (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R12 | NFS Protocol (first five pages) | |
| L13 | Congestion Control (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R13 | NATs | |
| L14 | Distributed Naming (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R14 | 9/11 | |
| L15 | Reliability (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R15 | Fault-tolerance War Stories | |
| L16 | Atomicity Concepts (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R16 | LFS | |
| L17 | Recoverability (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R17 | System R | |
| T4 | Tutorial | |
| L18 | Isolation (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R18 | More System R + Chocolate | |
| L19 | Transactions and Consistency (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R19 | Unison | |
| Q2 | Quiz 2: Material from L9 through R15 | |
| L20 | Multi-site Atomicity (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R20 | Durability | |
| T5 | Tutorial | |
| L21 | Security Introduction (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R21 | Security War Stories | |
| L22 | Authentication (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R22 | Trusting Trust | |
| L23 | Authorization and Confidentiality (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R23 | Why DO Cryptosystems Fail? | |
| R24 | Slammer and DoS | |
| L24 | Advanced Authentication (PDF) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R25 | Design Project 2 Presentations | |
| L25 | Complex, Trusted Systems (PDF) (Guest Lecture by Professor Hal Abelson) | (RM - 56K) (RM - 80K) (RM - 220K) |
| R26 | Hints for System Design | |
| Q3 | Quiz 3: Material from L16 through R26 |