DOC PREVIEW
MIT 6 826 - Suggestions for Further Reading

This preview shows page 1-2-3-21-22-23-43-44-45 out of 45 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

© 1983-1996 by Jerome H. SaltzerTopics in the Engineering of Computer SystemsChapter Nine: Suggestions for Further ReadingJerome H. SaltzerApril, 1996Table of ContentsIntroduction.........................................................................................................41. The systems bookshelf ....................................................................................51.1 Wonderful books..............................................................................51.2 Really good books............................................................................61.3. Other books deserving space on the systems bookshelf..................82 Generalities about systems.............................................................................102.1 Ways of thinking about systems.......................................................102.2 Examples of objectives of systems...................................................113 Memory in Computer Systems....................................................................... 113.1 Memory Allocation ..........................................................................113.2 Multilevel memory management......................................................124 Enforcing Modularity: Types, Clients, Servers, Kernels, and Threads..........134.1 Type-extension as a system organizing tool.....................................134.2 Kernels and Remote Procedures.......................................................134.3 Virtual Processors: Threads..............................................................145 Communications in Computer Systems.........................................................155.1 Networks ..........................................................................................155.2 Protocols...........................................................................................165.3 Organization for communication......................................................165.4 Practical aspects ...............................................................................176 Naming and Binding in systems..................................................................... 172 Suggestions for Further Reading6.1. Naming............................................................................................186.2. Examples of addressing architectures .............................................186.3 Examples of other naming systems.................................................. 197 Protection and Privacy in Computer Systems................................................207.1 Privacy..............................................................................................207.2. Encipherment as a Protection Mechanism ......................................207.3 Protection Architectures...................................................................227.4 Certification, Trusted Computer Systems and Security Kernels......238 Persistent Storage........................................................................................... 248.1 Persistence per se..............................................................................248.2 Properties of persistent storage devices............................................248.3 Examples of File Systems ................................................................249 Atomicity, Coordination, and Recovery.........................................................259.1 Atomicity.......................................................................................... 269.2 Synchronization and Deadlock.........................................................2710 Limits and Reliability...................................................................................2810.1 Limits of current technology..........................................................2810.2 Fault-Tolerance ..............................................................................2811 Control of Complexity..................................................................................2911.1 Wisdom about designing systems ..................................................2911.2 Keeping big systems under control: Case studies. .........................3011.3. Making your own contribution......................................................3112 Computer System Case Studies....................................................................3212.1 CAL................................................................................................3212.2 Hydra..............................................................................................3212.3 Unix¨............................................................................................... 3312.4 The Cambridge Systems.................................................................3312.5 Multics............................................................................................ 34Suggestions for Further Reading 312.6 3B20D and DMERT.......................................................................3412.7 Apollo/Domain...............................................................................3412.8 Alto OS...........................................................................................3512.9 Pilot ................................................................................................3512.10 VM/370 ........................................................................................ 3512.11 Grapevine .....................................................................................3512.12 Project Athena, Kerberos, and the X Window System ................3612.13 The World-Wide Web..................................................................3613. Papers of historic vision or perspective........................................................3613.1. Dramatic visions............................................................................3713.2. Sweeping new looks......................................................................37Acknowledgement................................................................................... 39Appendix: Timely Readings Related to Systems................................................391. Risks of Computer Systems. ..........................................................................401.1. General sources


View Full Document

MIT 6 826 - Suggestions for Further Reading

Documents in this Course
Consensus

Consensus

10 pages

Load more
Download Suggestions for Further Reading
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Suggestions for Further Reading and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Suggestions for Further Reading 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?