This table is a guide to the expected reading sequence
and approximate dates. You can use it to read ahead,
which is an excellent idea.
Assignment |
7th edition |
6th edition |
2006-01-16 First wave |
Chapter 1 (Intro) |
Chapter 1 (Intro) |
Chapter 2 (Computer-System Structures) |
Chapter 2 (OS Structures) |
Chapter 3 (OS Structures) |
Chapter 13.1 (I/O Overview) |
Chapter 13.2 (I/O Hardware) |
Chapter 13.3 (I/O Interface) |
2006-01-25 Second wave |
Chapter 3 (Process) Skip 3.5 (IPC), 3.6 (Client-Server) |
Chapter 4 (Process) Skip 4.5 (IPC), 4.6 (Client-Server) |
Chapter 4 (Thread) |
Chapter 5 (Thread) |
Chapter 6 (Synchronization) Skip 6.9 (Transactions) |
Chapter 7 (Synchronization) Skip 7.9 (Transactions) |
2006-02-01 Third wave |
Chapter 6.5.3, 6.6.3 (Deadlock intro, assigned in Wave 2) |
Chapter 7.4.3, 7.5.3 (Deadlock intro, assigned in Wave 2) |
Chapter 5 (Scheduling) |
Chapter 6 (Scheduling) |
Chapter 7 (Deadlock) |
Chapter 8 (Deadlock) |
Chapter 8 (Memory Management) |
Chapter 9 (Memory Management) |
Chapter 9 (Virtual Memory) |
Chapter 10 (Virtual Memory) |
2006-03-03 Fourth wave |
Chapter 12 (Mass-Storage Structure) |
Chapter 14 (Mass-Storage Structure) |
Chapter 10 (File-System Interface) |
Chapter 11 (File-System Interface) |
Chapter 11 (File-System Implementation) |
Chapter 12 (File-System Implementation) |
2006-03-15 Fifth wave |
Section 3.5 (IPC), 3.6 (Client-Server) |
Section 4.5 (IPC), 4.6 (Client-Server) |
Chapter 14 (Protection) |
Chapter 18 (Protection) |
Chapter 15 (Security) |
Chapter 19 (Security) |
Chapter 17 (Distributed File Systems) |
Chapter 16 (Distributed File Systems) |
Designing an Authentication System (optional, but fun)
|