© 1983-1996 by Jerome H. SaltzerTopics in the Engineering of Computer SystemsChapter Nine: Suggestions for Further ReadingJerome H. SaltzerApril, 1996Table of ContentsIntroduction.........................................................................................................41. The systems bookshelf ....................................................................................51.1 Wonderful books..............................................................................51.2 Really good books............................................................................61.3. Other books deserving space on the systems bookshelf..................82 Generalities about systems.............................................................................102.1 Ways of thinking about systems.......................................................102.2 Examples of objectives of systems...................................................113 Memory in Computer Systems....................................................................... 113.1 Memory Allocation ..........................................................................113.2 Multilevel memory management......................................................124 Enforcing Modularity: Types, Clients, Servers, Kernels, and Threads..........134.1 Type-extension as a system organizing tool.....................................134.2 Kernels and Remote Procedures.......................................................134.3 Virtual Processors: Threads..............................................................145 Communications in Computer Systems.........................................................155.1 Networks ..........................................................................................155.2 Protocols...........................................................................................165.3 Organization for communication......................................................165.4 Practical aspects ...............................................................................176 Naming and Binding in systems..................................................................... 172 Suggestions for Further Reading6.1. Naming............................................................................................186.2. Examples of addressing architectures .............................................186.3 Examples of other naming systems.................................................. 197 Protection and Privacy in Computer Systems................................................207.1 Privacy..............................................................................................207.2. Encipherment as a Protection Mechanism ......................................207.3 Protection Architectures...................................................................227.4 Certification, Trusted Computer Systems and Security Kernels......238 Persistent Storage........................................................................................... 248.1 Persistence per se..............................................................................248.2 Properties of persistent storage devices............................................248.3 Examples of File Systems ................................................................249 Atomicity, Coordination, and Recovery.........................................................259.1 Atomicity.......................................................................................... 269.2 Synchronization and Deadlock.........................................................2710 Limits and Reliability...................................................................................2810.1 Limits of current technology..........................................................2810.2 Fault-Tolerance ..............................................................................2811 Control of Complexity..................................................................................2911.1 Wisdom about designing systems ..................................................2911.2 Keeping big systems under control: Case studies. .........................3011.3. Making your own contribution......................................................3112 Computer System Case Studies....................................................................3212.1 CAL................................................................................................3212.2 Hydra..............................................................................................3212.3 Unix¨............................................................................................... 3312.4 The Cambridge Systems.................................................................3312.5 Multics............................................................................................ 34Suggestions for Further Reading 312.6 3B20D and DMERT.......................................................................3412.7 Apollo/Domain...............................................................................3412.8 Alto OS...........................................................................................3512.9 Pilot ................................................................................................3512.10 VM/370 ........................................................................................ 3512.11 Grapevine .....................................................................................3512.12 Project Athena, Kerberos, and the X Window System ................3612.13 The World-Wide Web..................................................................3613. Papers of historic vision or perspective........................................................3613.1. Dramatic visions............................................................................3713.2. Sweeping new looks......................................................................37Acknowledgement................................................................................... 39Appendix: Timely Readings Related to Systems................................................391. Risks of Computer Systems. ..........................................................................401.1. General sources
View Full Document