Attendance is expected for all lab days. (If you turn in a lab report early, you are excused from the remaining days devoted to that lab.) I will excuse up to two absences per student, for any reason. Use yours wisely. If you exceed this allowance, I may reduce your course grade by one letter grade.
For each lab, I will assign you a lab group. You will work with different people each lab, and with a different person for the presentation than for any of the labs. Thus, over the semester you will work with the majority of the class.
Each pair of students will be responsible for setting up a meeting with me the week before their presentation to go over it with me. (You are welcome to additional consultations as well.) At that meeting, you should also give me three straightforward questions about your reading. I will distribute these to the full class. All class members will email me their answers to these three questions by 6am the day of your presentation, as a way of making sure we all have a common starting point. I will look through them and alert you immediately before your presentation if there are any common difficulties you might want to address. No late answers will be accepted for these questions, as their point is to lay the groundwork for the presentation.
I will provide a list of attributes that good presentations have. For each presentation, each student in the audience will be asked to select two of these attributes that were particular strong points, and two that particularly need work. I will summarize this feedback for the presenters. I will also use the same list of attributes to structure my own evaluation of the presentation, which will take place in a face-to-face "debriefing" with the presenters, with the grade generated as a summary of that meeting.
I'm going to ask you to express a preference ranking for the topics, and will try to the extent possible to assign people to topics based on that. (You can also take into account in your preference rankings the timing of the presentations.) I'll need to have you email me the rankings by noon Monday (September 12) so that I can make the presentation and lab group assignments in time for the lab staring at the end of that week.
The title links below point to the official versions on the main USENIX site. These will give you the abstracts of the papers, and for the older ones even the full text. For the newer ones, you can get the full text from any on-campus location by using the link labeled "on-campus version."
Each class day (not counting lab days), you are to send me an email by 6am with your preparation assignment for that day. (Presumably this means you should send it before you go to bed.) I will look these over in order to shape the class to meet your needs. As additional incentive, they will count for a portion of your class grade, based on how many you submit. No late preparation assignments are accepted, as that would undermine their real purpose.
For classes with a student presentation of a conference paper, the preparation assignment will consist of questions provided by the presenters, as described in the section on presentations.
For all other class days, your assignment is to send me an agenda for that day's class. Is there old business from prior days that you see as needing more time? In the new topics from that day's reading, what are the main points we should cover? What illustrations, programs, or other examples from the book would you like to go over? Are there items for which you would like a different example?
You are to select your own homework problems. Each of the eleven chapters in the textbook ends with exercises, programming projects, and exploration projects. You may submit any of these, subject to the restrictions listed below. If I indicate that your initial solution is inadequate, you can submit a revised version, as many times as are necessary to succeed. For each one you eventually succeed at, you will receive one percentage point toward your course grade, up to a maximum of 22%. Thus, your grade will be maximized if you average two successful problems per chapter. Other than that, the restrictions are as follows:
You are expected to be familiar with the college academic honesty honor code policy, and to comply with that policy. If you have any questions about it, please ask. One specific requirement of that policy is that you write the following in full and sign it on every examination and graded paper:
On my honor, I pledge that I have not given, received, nor tolerated others' use of unauthorized aid in completing this work.
For the purposes of this policy, I am defining "graded papers" to be project reports but not daily preparation assignments or homework problems. (I still expect you to comply with the honor code on homework problems, just not to write the explicit pledge on them.) When project reports are co-authored, each co-author should write and sign the pledge.
One additional issue that arises from the team authorship of project reports is that all team members must stand behind all reports bearing their names. All team members have quality assurance responsibility for the entire project. If there is irreconcilable disagreement within the team it is necessary to indicate as much in the reports; this can be in the form of a ``minority opinion'' or ``dissenting opinion'' section where appropriate.
If you are too sick to complete an assignment on time, you will not be penalized. Simply write ``late due to illness'' at the top of the assignment, sign your name and hand it in. Other circumstances will be evaluated on a case-by-case basis.
If you have a learning, psychological, or physical disability for which a reasonable accommodation can be made, I would be happy to refer you to the college's disability services coordinator, and to cooperate in the accommodation process. It is generally best if this can be done as soon as possible.
This is my best guess as to the rate at which we will cover material. However, don't be shocked if I have to pass out one or more revised syllabi.
Date | Reading | Topic | Due |
---|---|---|---|
9/7 | 1 | Introduction | |
9/9 | 2 | Threads | |
9/12 | 3.1-3.3 | Scheduling Goals | |
9/13 | 3.4-3.7 | Scheduling Mechanisms | |
9/14 | Lab Preview | ||
9/16 | No class | ||
9/19 | 4.1-4.3 | Mutual Exclusion | |
9/20 | 4.4-4.6 | Other Synchronization Patterns | |
9/21 | Lab 1: Scheduling | ||
9/23 | 4.7-4.9 | Synchronization Pathologies | |
9/26 | Lab 1 continued | ||
9/27 | Nobel conference (no class) | ||
9/28 | Nobel conference (no class) | ||
9/30 | 5.1-5.2 | Example Applications of Transactions | |
10/3 | 5.3-5.4 | Mechanisms for Atomicity and Durability | |
10/4 | 5.5-5.6 | Additional Transaction Mechanisms | |
10/5 | Lab 1 continued | ||
10/7 | Lab 1 concludes | ||
10/10 | 6.1-6.2 | Uses for Virtual Memory | |
10/11 | 6.3 | Mechanisms for Virtual Memory | |
10/12 | 6.4-6.5 | Policies for Virtual Memory | Lab 1 |
10/14 | Lab 2: Virtual Memory (or Journaling) | ||
10/17 | Lab 2 Continues | ||
10/18 | 7.1-7.2 | POSIX Process Management | |
10/19 | paper 1 | Energy Efficient Prefetching | |
10/21 | 7.3-7.6 | Protection | |
10/26 | Lab 2 Concludes | ||
10/28 | paper 2 | Live Migration of Virtual machines | |
10/31 | Review | ||
11/1 | Midterm exam, 7:00pm-8:30pm, OHS 320 | ||
11/2 | 8.1-8.3 | POSIX File API | |
11/4 | 8.4-8.5.1.1 | Disk Space Allocation | Lab 2 |
11/7 | 8.5.1.2-8.6 | Metadata, Directories, and Indexes | |
11/8 | Lab Preview | ||
11/9 | Lab 3: File System | ||
11/11 | 8.7-8.9 | Metadata Integrity | |
11/14 | paper 3 | A Transactional Flash File System | |
11/15 | paper 4 | Designing for Disasters | |
11/16 | Lab 3 continues | ||
11/18 | 9.1-9.3.1 | Socket APIs | |
11/21 | 9.3.2-9.6 | Networking | |
11/22 | 10.1-10.3 | Messaging and Remote Method Invocation | |
11/23 | Lab 3 concludes | ||
11/28 | 10.4-10.5 | Web Services | |
11/29 | Lab Preview | Lab 3 | |
11/30 | Lab 4: Communication Middleware | ||
12/2 | 11.1-11.4 | Security Basics | |
12/5 | paper 5 | Achieving Least Privilege | |
12/6 | 11.5-11.8 | More on Security | |
12/7 | Lab 4 continues | ||
12/9 | paper 6 | Non-Control-Data Attacks | |
12/12 | Lab 4 concludes | ||
12/13 | paper 7 | Finding Security Vulnerabilities | |
12/14 | Review and evaluation | Lab 4 |