Syllabus and general information for MCS-378: Operating Systems (Fall 2009)


This course covers the basics of operating systems, as well as some material on concurrent programming, middleware, and networking. There are two principal reasons why a course on operating systems is practical to take (as opposed to just interesting), even if you never expect to be involved in the development of an operating system (which most of you won't):

Office hours

I will be available in my office (OHS 303) from 10:30-11:20 on Tuesdays through Fridays, as well as by appointment. Or try your luck: just stop by and see whether my door is open. You may send me electronic mail at or call me at extension 7466. I'll try to put any updates to my office hours on my web page, so check there if in doubt.

World Wide Web

All course materials will be available through my World Wide Web page. The URL for this course is After this syllabus I will give hardcopy handouts only to those students who want them.

Text and readings

The primary text for the course is Operating Systems and Middleware: Supporting Controlled Interaction by Max Hailperin. Recent conference papers serve as additional required readings; you have access to these through the syllabus on the web. Those conference papers will form the basis for the student presentations, described below.


There will be four lab assignments. The due dates for the labs are shown in the syllabus below. We'll meet in the OHS 326 lab on the days shown in the syllabus as lab days.

Attendance is expected for all lab days. (If you turn in a lab report early, you are excused from the remaining days devoted to that lab.) I will excuse up to two absences per student, for any reason. Use yours wisely. If you exceed this allowance, I may reduce your course grade by one letter grade.


There will be five days in the semester when I sit back and relax and let students teach the class instead. Each time, a student will have a class period to lead discussion on one of the papers we read from a conference. The whole class will be expected to read the paper at least casually, but the student leading the class will be expected to have read it more carefully and done whatever it takes to really understand it, which may involve additional background reading, talking with me, etc.

Each student will be responsible for setting up a meeting with me the week before their presentation to go over it with me. (You are welcome to additional consultations as well.) At that meeting, you should also give me three straightforward questions about your reading. I will distribute these to the full class. All class members will email me their answers to these three questions by 10:30am the day of your presentation, as a way of making sure we all have a common starting point. I will look through them and alert you immediately before your presentation if there are any common difficulties you might want to address. No late answers will be accepted for these questions, as their point is to lay the groundwork for the presentation.

I will provide a list of attributes that good presentations have. For each presentation, each student in the audience will be asked to select three of these attributes that were particular strong points, and three that particularly need work. I will summarize this feedback for the presenter. I will also use the same list of attributes to structure my own evaluation of the presentation, which will take place in a face-to-face “debriefing” with the presenter, with the grade generated as a summary of that meeting.

I'm going to ask you to express a preference ranking for the topics, and will try to the extent possible to assign people to topics based on that. I suggest you read the abstracts of the papers to help determine your preferences; you can also take into account the timing of the presentations. I'll need to have you email me the rankings by 10:30am Thursday (September 10).

  1. September 17 (Peter): "Hardware Execution Throttling for Multi-core Resource Management", Xiao Zhang, Sandhya Dwarkadas, and Kai Shen, 2009 USENIX Annual Technical Conference, June 2009, pages 293-298.
  2. October 22 (Ben): "Satori: Enlightened page sharing", Grzegorz Miłoś, Derek G. Murray, Steven Hand, and Michael A. Fetterman, 2009 USENIX Annual Technical Conference, June 2009, pages 1-14.
  3. November 9 (Kevin): "Enabling Transactional File Access via Lightweight Kernel Extensions", Richard P. Spillane, Sachin Gaikwad, Manjunath Chinni, Erez Zadok, and Charles P. Wright, 7th USENIX Conference on File and Storage Technologies, February 2009, pages 29-42.
  4. November 19 (Gabe): "Decentralized Deduplication in SAN Cluster File Systems", Austin T. Clements, Irfan Ahmad, Murali Vilayannur, and Jinyuan Li, 2009 USENIX Annual Technical Conference, June 2009, pages 101-114.
  5. December 14 (Patrick): "Crying Wolf: An Empirical Study of SSL Warning Effectiveness", Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor, 18th USENIX Security Symposium, August 2009, pages 399-416.

Daily preparation assignment

Each class day that has a reading assignment, you are to send me an email by 10:30am with your preparation assignment for that day. I will look these over in order to shape the class to meet your needs. As additional incentive, they will count for a portion of your class grade, based on how many you submit. No late preparation assignments are accepted, as that would undermine their real purpose.

For classes with a student presentation of a conference paper, the preparation assignment will consist of questions provided by the presenters, as described in the section on presentations.

For all other class days, your assignment is to send me an agenda for that day's class. Is there old business from prior days that you see as needing more time? In the new topics from that day's reading, what are the main points we should cover? What illustrations, programs, or other examples from the book would you like to go over? Are there items for which you would like a different example? Are there topics beyond the reading we ought to cover?

Homework assignment

You are to select your own homework problems. Each of the eleven chapters in the textbook ends with exercises, programming projects, and exploration projects. You may submit any of these, subject to the restrictions listed below. If I indicate that your initial solution is inadequate, you can submit a revised version, as many times as are necessary to succeed. For each one you eventually succeed at, you will receive one percentage point toward your course grade, up to a maximum of 22%. Thus, your grade will be maximized if you average two successful problems per chapter. Other than that, the restrictions are as follows:


There will be two intra-term exams and a final exam, which is scheduled by the registrar. Please let me know as soon as possible if you won't be able to take one of the tests at its scheduled time.


Students are encouraged to discuss the course, including issues raised by the assignments. However, the solutions to assignments should be individual original work unless otherwise specified. If an assignment makes you realize you don't understand the material, ask a fellow student a question designed to improve your understanding, not one designed to get the assignment done. To do otherwise is to cheat yourself out of understanding, as well as to be intolerably dishonorable.

Any substantive contribution to your solution by another person or taken from a publication should be properly acknowledged in writing. Failure to do so is plagiarism and will necessitate disciplinary action.

The same standards regarding plagiarism apply to team projects as to the work of individuals, except that the author is now the entire team rather than an individual. Anything taken from a source outside the team should be be properly cited.

One additional issue that arises from the team authorship of project reports is that all team members must stand behind all reports bearing their names. All team members have quality assurance responsibility for the entire project. If there is irreconcilable disagreement within the team it is necessary to indicate as much in the report; this can be in the form of a “minority opinion” or “dissenting opinion” section where appropriate.

You are expected to be familiar with the college academic honesty honor code policy and to comply with that policy. If you have any questions about it, please ask.

Late lab assignments

All lab assignments are due at the beginning of class on the day indicated. Late assignments will be penalized by one “grade notch” (such as A to A- or A- to B+) for each weekday late or fraction thereof. However, no late assignments will be accepted after graded assignments are handed back.

If you are too sick to complete an assignment on time, you will not be penalized. Simply write “late due to illness” at the top of the assignment, sign your name and hand it in. Other circumstances will be evaluated on a case-by-case basis.

Grade changes

Please point out any arithmetic or clerical error I make in grading, and I will gladly fix it. You may also request reconsideration if I have been especially unjust.


I will provide you with a letter grade on each lab assignment, on your presentation, and on each test, in addition to the mid-term and final grades, so that you may keep track of your performance. As a guideline, the course components will contribute to your final grade in the proportions indicated below:

Style guidelines

All homework and lab reports should be readily readable, and should not presuppose that I already know what you are trying to say. Use full English sentences where appropriate (namely almost everywhere) and clear diagrams, programs, etc. Remember that your goal is to communicate clearly, and that the appearance of these technical items plays a role in this communication process. Be sure your assignments are always stapled together and that your name is always on them.


If you have a learning, psychological, or physical disability for which a reasonable accommodation can be made, I would be happy to refer you to the college's disability services coordinator, and to cooperate in the accommodation process. It is generally best if this can be done as soon as possible.


In the reading column, a single number with no decimal point indicates an entire chapter. A number with three decimal points in it, such as or, refers to the material under the first or second heading within Section 8.5.1, even though those headings are not actually numbered.
9/103.1-3.3Scheduling Goals

9/143.4-3.7, updateScheduling Mechanisms
9/15Lab Preview
9/16Lab 1: Scheduling
9/17paper 1Execution Throttling (Peter)

9/214.1-4.3Mutual Exclusion
9/224.4-4.6Other Synchronization Patterns
9/23Lab 1 (continued)
9/244.7-4.9Synchronization Pathologies

9/285.1-5.2Example Applications of Transactions
9/29Lab 1 (continued)
9/305.3-5.4Mechanisms for Atomicity and Durability
10/15.5-5.6Additional Transaction Mechanisms

10/56.1-6.2Uses for Virtual Memory
10/6No class (attend Nobel Conference)
10/7No class (attend Nobel Conference)
10/8Review of chapters 1-5HW rewrites (1-5)

10/12Intra-term exam 1 (chapters 1-5)
10/136.3Mechanisms for Virtual Memory
10/146.4-6.5Policies for Virtual MemoryLab 1
10/15Lab 2Lab Preview

10/19Lab 2: Prepaging
10/207.1-7.2POSIX Process Management
10/22paper 2Virtual Machine Page Sharing (Ben)

10/26No class (reading day)
10/27No class (reading day)
10/28Lab 2 (continued)
10/298.1-8.3POSIX File API

11/28.4- Space Allocation
11/3Lab 2 (continued)
11/, Directories, and Indexes
11/58.7-8.9Metadata Integrity

11/9paper 3Transactional File Access (Kevin)Lab 2
11/10Lab 3: File Allocation
11/11ReviewHW rewrites (6-8)
11/12Intra-term exam 2

11/169.1-9.3.1Socket APIs
11/18Lab 3 (continued)
11/19paper 4A SAN Cluster File System (Gabe)

11/23Lab 3 (continued)
11/24Lab 3 (continued)
11/25No class (Thanksgiving)
11/26No class (Thanksgiving)

11/3010.1-10.3Messaging and Remote Method Invocation
12/110.4-10.5Web Services
12/2Lab PreviewLab 3
12/3Lab 4: Communication Middleware

12/711.1-11.4Security Basics
12/8Lab 4 (continued)
12/911.5-11.8More on Security
12/10Lab 4 (continued)

12/14paper 5SSL Warning Effectiveness (Patrick)
12/15Review and evaluationLab 4, HW rewrites (9-11)

Course web site:
Instructor: Max Hailperin <>