This table is a guide to the expected reading sequence
and approximate dates. You can use it to read ahead,
which is an excellent idea.
Assignment |
OS: P+P |
OSC: 8th edition |
OSC: 7th edition |
OSC: 6th edition |
2013-08-26 First wave |
Chapter 1 (Intro) |
Chapter 1 (Intro) |
Chapter 1 (Intro) |
Chapter 2 (Computer-System Structures) |
Chapter 2 (The Kernel Abstraction) |
Chapter 2 (OS Structures) |
Chapter 3 (OS Structures) |
Section 3.0 [Chapter Intro] |
Section 3.5 (OS Structure) |
Section 11.3 (Software Layers) |
Chapter 13.1 (I/O Overview) |
Chapter 13.2 (I/O Hardware) |
Chapter 13.3 (I/O Interface) |
2013-09-04 Second wave |
Sections 3.1 (Process Management), 3.2 (I/O), 3.3 (Shell) |
Chapter 3 (Process) Skip: 3.4-3.5 (IPC), 3.6 (Client-Server) |
Chapter 3 (Process) Skip: 3.4 (IPC), 3.5 (Client-Server) |
Chapter 4 (Process) Skip: 4.5 (IPC), 4.6 (Client-Server) |
Chapter 4 (Concurrency & Threads) |
Chapter 4 (Threads) |
Chapter 5 (Threads) |
Chapter 5 (Synchronization), Section 3.4 (Producer/Consumer) |
Chapter 6 (Synchronization) Skip: 6.9 (Transactions) |
Chapter 7 (Synchronization) Skip: 7.9 (Transactions) |
2013-09-18 Third wave |
Chapter 6 (Advanced Synchronization) |
Chapter 6.5.3, 6.6.3 (Deadlock intro, assigned in Wave 2) |
Chapter 7.4.3, 7.5.3 (Deadlock intro, assigned in Wave 2) |
Chapter 7 (Deadlock) |
Chapter 8 (Deadlock) |
Chapter 8 (Address Translation) |
Chapter 8 (Main Memory) |
Chapter 9 (Memory Management) |
Chapter 9 (Caching & VM) |
Chapter 9 (Virtual Memory) |
Chapter 10 (Virtual Memory) |
Chapter 7 (Scheduling) |
Chapter 5 (Scheduling) |
Chapter 6 (Scheduling) |
2013-11-01 Fourth wave |
Chapter 12 (Storage Devices) |
Chapter 12 (Mass-Storage Structure) |
Chapter 14 (Mass-Storage Structure) |
Chapter 11 (File System Intro) |
Chapter 10 (File-System Interface) |
Chapter 11 (File-System Interface) |
Chapter 13 (Files & Directories) |
Chapter 11 (File-System Implementation) |
Chapter 12 (File-System Implementation) |
2013-11-15 Fifth wave |
(see lecture) |
Section 3.4-3.5 (IPC), 3.6 (Client-Server) |
Section 3.4 (IPC), 3.5 (Client-Server) |
Section 4.5 (IPC), 4.6 (Client-Server) |
(see lecture) |
Chapter 14 (Protection) |
Chapter 18 (Protection) |
(see lecture) |
Chapter 15 (Security) |
Chapter 19 (Security) |
Web page: Designing an Authentication System (optional, but fun)
|
(see lecture) |
Chapter 17 (Distributed File Systems) |
Chapter 16 (Distributed File Systems) |
Chapter 14 (Reliable Storage) |
(see lecture) |