CIS307: Selected Topics
Understanding Concurrency:
Interleavings
Spinlocks and Semaphores
Readers and Writers
Monitors
Introduction to Distributed Systems, Middleware, and Client-Server and Peer-to-Peer Systems
Pai, Druschel, Zwaenepoel: Flash: An Efficient and Portable Web Server
Unix I: process management and file commands
Jan Newmarch (Canberra U.):
Processes
,
Process Management
,
IPC 1
,
IPC 2
Unix oriented, with code examples
Unix II: errors, pipes, FIFOs, protection, file locks, shared memory, and memory-mapped IO
Using Read and Write Locks: Example
Signals
Tutorial on Signals by Jim Frost (Software Tool & Die)
Measuring Time
lmbench:
Tools for Performance Analysis
Performance Analysis Results using LMBENCH
Sun Performance Information
Unix III: select
Threads:
Part I
,
Part II
Livermore: Posix Threads Programming
CMU 15-412: Operating Systems: Threads
John Ousterhout's
Why Threads are a Bad Idea
Guide to DecTHREADS
SUN's Multithreaded Programming Guide
Performance Evaluation
Rules of Thumb in Data Engineering
File Structure - Stable Storage
Princeton University CS598e: Distributed Storage Systems
Networks:
Unix IV: Sockets
Data Transmission
Packet Transmission
Network Architectures
Structure and Naming in the Internet
Subnetting and CIDR
(Connected: An Internet Encyclopedia)
See also
RFC1812
Examples of Layers and Protocols
A Quick Tour around TCP
Some Distributed Graph Algorithms used in Networks
For Networks see also:
Leon-Garcia, Indra Widjaja: Communication Networks
James Kurose, Keith Ross: Computer Networking
Peterson, Davie: Computer Networks: A Systems Approach
Introduction to Networks
,
Unix Scavenger Hunt
,
Protocol Analysis using Lanwatch
, by
Professor Robert Stafford (Temple University)
The Network Book by Professor Yechiam Yemini (Columbia University)
CISCO's Information on Networking
3COM White Papers on Networking
Connected: An Internet Encyclopedia
Internet Engineering Curriculum Repository
Transactions
Transaction Processing Concepts and Techniques
Security
Introduction to Public-Key Cryptography (Netscape)
Introduction to the Secure Sockets Layer (SSL)
RSA Laboratories FAQ
The SANS Institute: Top Ten Security Threats
RedHat Security info
Cheswick-Bellovin: Firewalls and Internet Security
Remote Procedure Calls
Tom Doepner: - Brown University - Remote Procedure Calls
Douglas C. Schmidt: - Washington University - Overview of Remote Procedure Call
Digital Unix: Programming with ONC RPC
Sun's ONC+ Developer's Guide
Mutual Exclusion and Elections in Distributed Systems
Logical Clocks
Deadlocks