CS555: Distributed Systems [Fall 2012] |
| [Announcements] | [Syllabus] | [Grading] | [Schedule] | [Assignments] |
Page was lasted updated on Monday, December 10, 2012 9:49 AM
Readings will be based on the following textbooks.
| [TvS] | Distributed Systems: Principles and Paradigms. Andrew S. Tanenbaum and Maarten van Steen. 2nd Edition. Prentice Hall. ISBN: 0132392275/978-0132392273. |
| [CDKB | Distributed Systems: Concepts and Design. George Coulouris, Jean Dollimore, Tim Kindberg, Gordon Blair. 5th Edition. Addison Wesley. ISBN: 978-0132143011 |
| [KS] | Distributed Computing: Principles, Algorithms, and Systems. Ajay Kshemkalyani and Mukesh Singhal. 1st edition. Cambridge University Press. ISBN: 0521876346/ 978-0521876346. |
| [GPB] | Java Concurrency in Practice. Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Addison-Wesley Professional. ISBN: 0321349601/978-0321349606. |
| [NL] | Distributed Algorithms. Nancy Lynch. 1st edition. Morgan Kaufman. ISBN: 1558603484/978-1558603486. |
| [GR] | Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. George Reese.1st edition. O'Reilly. ISBN: 0596156367/978-0596156367. |
| [PD] | Computer Networks: A Systems Approach. Larry Peterson and Bruce Davie. 4th edition. Morgan Kaufmann. ISBN: 978-0-12-370548-8. |
| [FS] | Practical Cryptography. Niels Ferguson and Bruce Schneier. 1st edition. Wiley Publishing. ISBN: 0-471-22894-X/0-471-22357-3. |
| [WS] | Cryptography and Network Security: Principles and Practice. William Stallings. 5th Edition. Prentice Hall. ISBN: 0136097049/978-0136097044 |
| [RR] | Unix Systems Programming. Kay Robbins & Steve Robbins, 2nd edition. Prentice Hall. ISBN: 978-0-13-042411-2. |
| [SGG] | Operating Systems Concepts. Avi Silberschatz, Peter Galvin, Greg Gagne. 8th edition. John Wiley & Sons, Inc. ISBN-13: 978-0-470-12872-5. |
The following is the tentative schedule for the course. This is subject to changes.
| Week | Date | Topic | Assignments | Readings |
| 1 | Aug 20-24 | Introduction Lecture 1 (8/21) Architectural Styles Lecture 2 (8/23) |
HW1 8/23 |
[TvS] Chap {2, 6} [KS] Chap {1, 3} |
| 2 | Aug 27- Aug 31 | Time and Logical Clocks Lamport's Clocks Vector and Matrix Clocks Time synchronization algorithms Lecture 3 (8/28) Lecture 4 (8/30) |
[TvS] Chap {3,6} [KS] Chap {3,6} [CDKB] Chap {14} [SGG] Ch {4, 5} [RR] Chap {12} |
|
| 3 | Sep 03-07 | Threads and Distributed Servers Development of Scalable Servers Harnessing cluster servers Lecture 5 (9/4) Lecture 6 (9/6) |
HW2 9/5 HW1 due 9/7 |
[TvS] Chap {5} [CDKB] Chap {7} [KS] Chap {18} [GPB] Chap {1,2,11} |
| 4 | Sep 10-14 | Lecture 7 (9/11) P2P Systems Structured and Unstructured P2P Systems Time & Space complexity of P2P algorithms Lecture 8 (9/13) |
[CDKB] Chap {10} |
|
| 5 | Sep 17-21 | Lecture 9 (9/18) Lecture 10 (9/20) |
[CDKB] Chap {10} [TvS] Chap {5} |
|
| 6 | Sep 24- Sep 28 | Lecture 11 (9/25) Naming in Distributed Systems |
HW3 9/24 | |
| 7 | Oct 01-05 | Lecture 13 (10/2) Content Dissemination Systems (a) Queuing Systems (b) Publish/Subscribe and P2P systems (c) Epidemic protocols (d) Overlays Lecture 14 (10/4) |
[TvS] Chap {4, 6} [KS] Chap {18} [CDKB] Chap {4} |
|
| 8 | Oct 08-12 | Lecture 15(10/9) Midterm I (10/11) |
Midterm I on 10/11 | [CDKB] Chap {4} [KS] Chap {13} |
| 9 | Oct 15-19 | Replication Consistency Models (a) Data and client centric consistency (b) Consistency Protocols (c) Replica placements Lecture 17 (10/16) Lecture 18 (10/18) |
HW3 due 10/17 | [TvS] Chap {7} [CDKB] Chap {18} |
| 10 | Oct 22-26 | Lecture 19 (10/23) Lecture 20 (10/25) |
[Amazon-Consistency Paper] |
|
| 11 | Oct 29 - Nov 02 | Distributed File Systems (a) Andrew File System (b) Google File System Lecture 21 (10/30) Lecture 22 (11/1) |
HW4 10/29 Term Paper 10/29 HW2 due 10/31 |
[GFS Paper] |
| 12 | Nov 05-09 |
Lecture 23 (11/5) Amazon Dynamo Lecture 24 (11/8) Lecture 24.b [Discussion on HW4] (11/8) |
||
| 13 | Nov 12-16 | Lecture 25 (11/13) Programming models for Data Intensive Computing (a) MapReduce (b) Dryad Lecture 26 (11/15) |
[Computing Economics] [MapReduce Paper] [Dryad Paper] |
|
| Nov 19-23: Fall Break | ||||
| 14 | Nov 26-Nov 30 | Lecture 27 (11/27) Cryptography Basics (a) Symmetric/Asymmetric cryptography (b) Message Digests (c) Message Authentication Codes (d) Cryptographic attack scenarios Authorization and Access Control using Kerberos; Needham-Schroeder protocol Lecture 28 (11/29) |
HW4 due 11/29 | [FS] Chap {1-8} [WS] Chap {3-6} [WS] Chap {11, 12} |
| 15 | Dec 03-07 | Grid Security Infrastructure (GSI) Security for computational grids Lecture 29.a (12/3) Lecture 29.b (12/3) Virtualization (a) Full and Para Virtualization Lecture 29 (12/4) Guest Lecture by Wesley Lloyd |
Midterm II on 12/6 |
[GSI Paper] |
| 16 | Dec 09-14 | Term Paper Presentations Guidelines for Presentations |
||
| Dec 18: Grades will be posted | ||||
| Department of Computer Science, Colorado State University, Fort Collins, CO 80523 USA © 2012 Colorado State University |