Course Introduction and Overview

Course Introduction and Overview

This lecture introduces the course structure, objectives, and foundational concepts in computer systems design. It outlines design principles, scope, expected outcomes, and key themes such as abstraction and modularity to be explored through the course.

Amazon’s Dynamo – Highly Available Key-Value Store

Amazon’s Dynamo – Highly Available Key-Value Store

Dynamo is Amazon’s decentralized, highly available key-value storage system designed for e-commerce applications requiring high reliability and scalability. It uses consistent hashing, vector clocks for versioning, quorum-based replication, hinted handoff, anti-entropy repair, and gossip-based membership for fault tolerance and eventual consistency.

Speak-up Defense Mechanism for Application-Level DDoS

Speak-up Defense Mechanism for Application-Level DDoS

This paper presents Speak-up, a bandwidth-based pricing mechanism to defend against application-level DDoS attacks. It analyzes attack mitigation via client bandwidth payment, fairness against attackers and good clients, deployment challenges, and performance evaluation under different network conditions.

Internet Measurement Conference 2005 Insights

Internet Measurement Conference 2005 Insights

This document contains research papers and analyses from the 2005 Internet Measurement Conference (IMC), focusing on network behaviors, traffic characterization, anomaly detection, and performance evaluation of internet systems and protocols.

Demand Paging and Virtual Memory Management

Demand Paging and Virtual Memory Management

This lecture explains demand paging as a virtual memory technique where only necessary pages are loaded into physical memory. It covers page tables, page faults, swap space, page replacement policies like FIFO and LRU, page fault handling, and the impact of thrashing and working sets on system performance.