6.033 | Spring 2018 | Undergraduate
Computer System Engineering

Resource Index

This resource index gives users access to most of the course resources in a single location.

INSTRUCTOR INSIGHTS VIDEO

View full video

Infusing Active Learning into 6.033 Recitations

View by chapter

TITLE RECITATIONS LECTURES READINGS TUTORIALS ASSIGNMENTS
Week 1: Operating Systems Part I

Recitation 1: Worse is Better

Recitation 2: We Did Nothing Wrong

Lecture 1: Coping with Complexity

Notes | Slides (PDF)

Lecture 1:

Sections 1.1–1.5 and 4.1–4.3

Tutorial 1: Introduction to 6.033 Communication

System Critique Assignment 1
Week 2: Operating Systems Part II

Recitation 3: Domain Name System

Recitation 4: UNIX Part 1

Lecture 2: Naming in Systems

Notes | Slides (PDF)

Lecture 3: Operating Systems + Virtual Memory

Notes | Slides (PDF)

Lecture 2:
Sections 2.2 and 3.1

Lecture 3:
Sections 5.1, 5.3, and 5.4

Tutorial 2: Consensus and Critique

Week 3: Operating Systems Part III

Recitation 5: UNIX Part 2

Lecture 4: Bounded Buffers + Locks

Notes | Slides (PDF)

Lecture 5: Threads

Notes | Slides (PDF)

Lecture 4:
Section 5.2

Lecture 5:
Sections 5.5 and 5.6

Tutorial 3: Design Project Discussion

Design Project Preliminary Report (DPPR) Assignment (PDF)

Week 4: Operating Systems Part IV

Recitation 6: Eraser

Recitation 7: MapReduce

Lecture 6: Operating Systems Structure + Virtual Machines

Notes | Slides (PDF)

Lecture 7: Performance

Notes | Slides (PDF)

Lecture 6:
Section 5.8

Lecture 7:
Chapters 17–18 of the 6.02 notes

Tutorial 4: Writing the Critiques & Introduction to Collaboration

System Critique Assignment 2

Week 5: Networking I

Recitation 8: The Design Philosophy of the DARPA Internet Protocols

Recitation 9: Landmark Routing

Lecture 8: Intro to Networking

Notes | Slides (PDF)

Lecture 9: Routing 

Notes | Slides (PDF)

Lecture 8:

Section 7.2

Lecture 9:

Chapters 17–18 of the 6.02 notes

Tutorial 5: Collaboration and Figures

 
Week 6: Networking II

No Recitation 10

Recitation 11: RON

Lecture 10: BGP

Notes | Slides (PDF)

Lecture 11: Transport Layer

Notes | Slides (PDF) 

Lecture 10:

BGP Tutorial (PDF)

Lecture 11:

Chapter 19 of the 6.02 notes

Tutorial 6: Assembling the DPPR

Week 7: Networking III

Recitation 12: DCTCP

Recitation 13: CDNs

Lecture 12: In-Network Resource Management

Notes | Slides (PDF)

Lecture 13: P2P Networks + Content Distribution Networks

Notes | Slides (PDF)

Lecture 12:

No readings assigned

Lecture 13:

No readings assigned

No Tutorial 7

Week 8: Distributed Systems I

Recitation 14: Distributed Storage

No Recitation 15

Lecture 14: Reliability via Replication

Notes | Slides (PDF)

Lecture 15: Introductions to Transactions

Notes | Slides (PDF) 

Lecture 14:

Sections 8.1–8.3

Lecture 15:

Sections 9.1, 9.2.1, and 9.2.2

Tutorial 8: DP Presentation

Quiz 1

Design Project Presentation Assignment (PDF) & Evaluation Guide (PDF)

Week 9: Distributed Systems II

Recitation 16: Log-Structured File System (LFS)

Recitation 17: Databases

Lecture 16: Atomicity via Logging

Notes | Slides (PDF)

Lecture 17: Fault Tolerence Isolation

Notes | Slides (PDF)

Lecture 16:

Section 9.3

Lecture 17:

Sections 9.4 before 9.4.1 and 9.5

No Tutorial 9

Week 10: Distributed Systems III

Recitation 18: Consistency Guarantees

Lecture 18: Distributed Transactions

Notes | Slides (PDF)

Lecture 18:

Section 9.6

Tutorial 10: Analysis and Evaluation

Design Project Report (DPR) Assignment (PDF) & Rubric (PDF)

Week 11: Security I

Recitation 19: Raft

No Recitation 20

Lecture 19: Availability via Replication

Notes | Slides (PDF)

Lecture 20: Intro to Security

Notes | Slides (PDF)

Lecture 19:

No readings assigned

Lecture 20:

Section 11.1

Tutorial 11: Peer Review

Design Project Peer Review Assignment (PDF)

Week 12: Security II

Recitation 21: Why Cryptosystems Fail

Recitation 22: DNSSEC

Lecture 21: Authentication and Passwords

Notes | Slides (PDF)

Lecture 22: Secure Channels

Notes | Slides (PDF)

Lecture 21:

Section 11.2

Lecture 22:

Sections 11.3–11.5

Tutorial 12: Final DP Report

Week 13: Security III

Recitation 23: Botnets

Recitation 24: Memory Corruption

Lecture 23: Network Security and DDoS Attacks

Notes | Slides (PDF)

Lecture 24: Bitcoin

Notes | Slides (PDF)

Lecture 23:

No readings assigned

Lecture 24:

No readings assigned

No Tutorial 13

Week 14: Security IV

Recitation 25: Meltdown

Recitation 26: Trusting Trust

Lecture 25: Tor

Notes | Slides (PDF)

Lecture 26: Policy vs Mechanism

Slides (PDF)

Lecture 25:

No readings assigned

Lecture 26:

The Night Watch (PDF)” by James Mickens

No Tutorial 14

Quiz 2

Course Info
Instructor
As Taught In
Spring 2018
Learning Resource Types
notes Lecture Notes
assignment Written Assignments
group_work Projects with Examples
co_present Instructor Insights