More Computer Science Courses
Computer System Engineering
Course Description
In this course, Professor Hari Balakrishnan gives 25 video lectures on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. The Instructor will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. In these video lectures, students engage in extensive written communication exercises. This course is worth 4 Engineering Design Points.
This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering).

Video Lectures & Study Materials
# | Lecture | Play Lecture |
---|---|---|
4 | Naming (47:59) | Play Video |
5 | Fault Isolation with Clients and Servers (50:28) | Play Video |
6 | Virtualization and Virtual Memory (49:47) | Play Video |
7 | Virtual Processors: Threads and Coordination (50:51) | Play Video |
8 | Performance (48:44) | Play Video |
9 | Introduction to Networks (50:29) | Play Video |
10 | Layering and Link Layer (47:35) | Play Video |
11 | Network Layer and Routing (50:55) | Play Video |
12 | End-to-End Layer (50:23) | Play Video |
13 | Congestion Control (53:36) | Play Video |
14 | Distributed Naming (51:44) | Play Video |
15 | Reliability (49:09) | Play Video |
16 | Atomicity Concepts (50:30) | Play Video |
17 | Recoverability (50:49) | Play Video |
18 | Isolation (51:07) | Play Video |
19 | Transactions and Consistency (47:09) | Play Video |
20 | Multi-site Atomicity (50:50) | Play Video |
21 | Security Introduction (50:57) | Play Video |
22 | Authentication (51:44) | Play Video |
23 | Authorization and Confidentiality (39:32) | Play Video |
24 | Advanced Authentication (50:02) | Play Video |
25 | Complex and Trusted Systems (48:47) | Play Video |
Comments
*If any embedded videos constitute copyright infringement, we strictly recommend contacting the website hosts directly to have such videos taken down. In such an event, these videos will no longer be playable on CosmoLearning or other websites.