| Topic | Details | Reading | Remarks |
|---|---|---|---|
| 1. Introduction | Principles of building systems Course overview |
Lampson: Hints for computer systems design | |
| 2. The Cloud | Cloud applications Datacenters Web vs. cloud vs. cluster |
Armbrust et al.:A view of cloud computing | |
| 3. Networking basics | Datacenter networks | HW1 online | |
| 4. Software-defined networks | SDNs | Feamster et al.: The road to SDN | |
| 5/6. Programmable switches + P4 | Protocol-independent packet processing | Bosshart et al: P4 | |
| 7. Load balancing | ECMP, Load-sensitive routing | Katta et al: Hula | HW1 due |
| 8. P4 lab | P4 hands-on exercises | HW2 online | |
| 9. Cloud storage | Key value stores Concurrency control DynamoDB |
||
| 10. Storage at Facebook | Case study: Facebook | ||
| 11. Concurrency | Consistency models Synchronization Deadlocks |
Vogels: Eventually consistent | |
| 12. Faults and Failures I | Internet basics Byzantine faults |
Tseitlin: The antifragile organization | HW2 due |
| 13. Faults and Failures II | Handling failures Correlated failures |
Corbató: On building systems that will fail | |
| 14. Diagnosis | Declarative Networking Provenance and Diagnosis |
Loo et al.: Declarative networking | |
| 15. MapReduce | Programming model Hadoop |
||
| 16. Cloud services | Quiz 1 | ||
| 17. Peer-to-Peer | P2P networks | ||
| 18. Security basics | Crypto basics Attacks |
||
| 19. Denial of service | Smurf sttacks DDoS Botnets |
The Mirai botnet | |
| 20. Anonymity | DCNet Tor |
||
| 21. Routing security | BGP Prefix hijacking |
||
| 22. Differential Privacy | Data privacy Attacks |
Dwork et al.:Differential Privacy | |
| 23. Accountability | Fault detection Timing fault |
||
| 24. Bitcoin | Bitcoin Hash chains |
Quiz 2 |