Topic | Details | Reading | Remarks |
---|---|---|---|
1. Introduction | Principles of building systems Course overview |
Lampson: Hints for computer systems design | |
2. The Cloud | Cloud applications Datacenters Web vs. cloud vs. cluster |
Armbrust et al.:A view of cloud computing | |
3. Networking basics | Datacenter networks | HW1 online | |
4. Software-defined networks | SDNs | Feamster et al.: The road to SDN | |
5/6. Programmable switches + P4 | Protocol-independent packet processing | Bosshart et al: P4 | |
7. Load balancing | ECMP, Load-sensitive routing | Katta et al: Hula | HW1 due |
8. P4 lab | P4 hands-on exercises | HW2 online | |
9. Cloud storage | Key value stores Concurrency control DynamoDB |
||
10. Storage at Facebook | Case study: Facebook | ||
11. Concurrency | Consistency models Synchronization Deadlocks |
Vogels: Eventually consistent | |
12. Faults and Failures I | Internet basics Byzantine faults |
Tseitlin: The antifragile organization | HW2 due |
13. Faults and Failures II | Handling failures Correlated failures |
Corbató: On building systems that will fail | |
14. Diagnosis | Declarative Networking Provenance and Diagnosis |
Loo et al.: Declarative networking | |
15. MapReduce | Programming model Hadoop |
||
16. Cloud services | Quiz 1 | ||
17. Peer-to-Peer | P2P networks | ||
18. Security basics | Crypto basics Attacks |
||
19. Denial of service | Smurf sttacks DDoS Botnets |
The Mirai botnet | |
20. Anonymity | DCNet Tor |
||
21. Routing security | BGP Prefix hijacking |
||
22. Differential Privacy | Data privacy Attacks |
Dwork et al.:Differential Privacy | |
23. Accountability | Fault detection Timing fault |
||
24. Bitcoin | Bitcoin Hash chains |
Quiz 2 |