16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

OS Security and Protection Access control, buffer overflow exploits,<br />

OS mechanisms for providing security and<br />

controlling access to resources<br />

4<br />

OS/SF<br />

Virtual Machines (OS)/Cross-Layer<br />

Communications (SF)/Virtualization and<br />

Isolation (SF)<br />

Types of virtualization, design of different<br />

hypervisors, virtualization trade-offs<br />

3<br />

OS Device Management Briefly discuss device drivers, briefly<br />

discuss mechanisms used in interfacing a<br />

range of devices<br />

OS File Systems File system design and implementation,<br />

files, directories, naming, partitioning<br />

OS Fault Tolerance Discuss and define relevance of fault<br />

tolerance, reliability, and availability in OS<br />

design<br />

1<br />

3<br />

1<br />

NC Reliable Data Delivery OS role in reliable data delivery 0.5<br />

NC Networked Applications/Introduction Role of OS in network naming schemes,<br />

role of layering<br />

1<br />

NC Routing and Forwarding Role of OS in routing and forwarding 0.5<br />

OS Real Time and Embedded Systems 0<br />

Additional topics<br />

Other comments<br />

I have often contemplated replacing Project Four with one that focused on File Systems rather than Security.<br />

However, the students really enjoy the Stack Smashing project, and we do not offer another course that focuses on<br />

Security in our curriculum.<br />

- 329 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!