programs shouldn’t be able to refer to (and corrupt) each others’ memory 2. *Katrina is the only person with a complicated office hours schedule. We would like to show you a description here but the site won’t allow us. 2. 5830 are assigned based on a semester long project, as well as two exams and 7 assignments -- 4 labs and 3 problem sets -- of varying length. Before Recitation. It's meant for an environment where lots of users are writing to the files, the files are really big, and failures are common. 4100) where mathematical issues may arise. Print this page. As you read Section 4, don't get too stuck on 4. Instructors Henry Corrigan-Gibbs 32-G970 [email protected] and 6. edu | 6. edu | 6. 4590[J] (taken as part of a track) in the Departmental Program]; at least two of these subjects must be designated as communication-intensive (CI-H) to fulfill the. The design project requires you to develop a detailed system design to solve a real-world problem. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). They typically release at 12:00pm Eastern on their relase date and are due at 11:59pm on their due date (which is often a Tuesday, unless the preceding Monday is a holiday). 1800 2023 (backup) C S1 S2 (primary) primary chooses order of operations, decides all non-deterministic values primary ACKs coordinator only after it’s sure that backup has all updates to increase availability, let’s try replicating data on two servers clients communicate only with C, not with replicasThis paper requires an MIT personal certificate for access: The UNIX Time-Sharing System. edu Websites Stellar Announcements, calendar, grades, and PDF course content. edu Websites Stellar Announcements, calendar, grades, and PDF course content. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). txt distance-vector routing TCP, UDP 6. 1800 2023 6. 6. 1800 2023 6. (The desks in these rooms are close together, but both rooms will be at about 50% capacity. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). Katrina LaCurts | [email protected] Help. Read "Staring into the Abyss: An Evaluation of Concurrency Control with One Thousand Cores”; skip Sections 4. The first six sections of this paper give context and motivation. DNSSEC is not yet wideaspread. lacurts@mit. edu Nickolai Zeldovich 32-G994 [email protected] | 6. Lectures deliver the fundamental technical concepts; recitations show you how those concepts are applied to real systems. After reading Sections 5 and 6, you should understand the real-world performance of MapReduce. edu Questions? 61600-staff@csail. 6. Jay runs the following three commands inside of his home directory: Before Recitation. 9800 Independent Study in Electrical Engineering and Computer Science. 1800 2023 operating systems enforce modularity on a single machine using virtualization in order to enforce modularity + have an effective operating system, a few things need to happen 1. Senior Lecturer, Undergraduate Officer, MIT EECS. This paper discusses a few different types of attacks on DNS as well as DNSSEC, a proposed extension to DNS to mitigate some of the security concerns. Artificial Intelligence & Decision. Katrina LaCurts | [email protected] will be based on the results of two quizzes (one in the middle of the term and one in final's week, 35% in total), labs 1-5 (55%), and class participation and homeworks (e. The registrar has 6. Slides: all animations, limited animations; Outline; Close-up recording of stack-smashing demos. This paper requires an MIT personal certificate for access: The UNIX Time-Sharing System. ) Question for Recitation: Before you come to this recitation, you'll turn in a brief answer. Before Recitation. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). edu Teaching Assistants Ben Kettle BK bkettle@mit. Katrina LaCurts | [email protected] hands-ons are set up as assignments on Gradescope, and we'll be linking to them via Canvas. 5831 is a undergraduate class designed to satisfy the AUS requirement in the EECS curriculum. 1800 2023 threat model: adversary controls a botnet, and is aiming to prevent access to a legitimate service via DDoS attacks policy: maintain availability of the service additional challenge: some DDoS attacks mimic legitimate traffic, and/or attempt to exhaust resources on the server itselfFor each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). The first two sections of the paper give many examples of instances where the end-to-end argument applies; later sections discuss some finer points. DCTCP customizes the TCP congestion control algorithm for datacenters. Preparation. Katrina LaCurts | lacurts@mit. 033, and ran under that number for literal decades (since before I was born!), so please forgive Getting Help. If your last name starts with letters A-O, go to 26-100; P-Z, go to 34-101. we want to build systems that serve many clients, store a lot of data, perform well, all while keeping availability high transactions — which provide atomicity and isolation — make it easier for us to reason about failuresBefore Recitation. edu. edu | 6. This paper is different from many of the papers that we've read in 6. (The. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). edu | 6. This paper, from 2010, describes the Akamai platform, which improves the performance of technologies that the Internet was not designed for (e. About. The exam will cover all material from Lecture 15 - Recitation 26. Grading. Before reading the paper, refresh your memory on what race conditions are and the troubles that they can cause by revisiting sections 5. (If you're having trouble accessing the paper,. These days, we typically use the term on-path attacker (or sometimes person-in-the-middle attack). 1800 Spring 2023 Lecture #25: Network-based attacks preventing access — denying service — to online resources. You can enable closed-captioning on. 3, 5. The hands-ons are set up as assignments on Gradescope, and we'll be linking to them via Canvas. 1800 | Lecture 24. Before Recitation Read the Ethernet paper. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). 6. 6. The title of the paper is based on a famous quote:6. 1800 2023 6. The paper contrasts Raft to an algorithm called Paxos: you do not need to know anything about Paxos to read this paper. In tutorial, you'll learn communication skills to help you reason about systems, and describe and defend your own. Hands-on 3: Networking. The primary assignment in 6. Section 1 introduces the main goals of RON and summarizes the main results. Juniors have an additional year of such experience. edu) for help. edu | 6. edu | 6. You can enable closed-captioning on. 1800 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. 1800 | Lecture 01. The hands-ons are set up as assignments on Gradescope, and we'll be linking to them via Canvas. edu | 6. edu | 6. The title of the paper is based on a famous quote: 6. This is paper written by MIT authors in 2014, and published in VLDB (one of the top two conferences in the databases field). Outline. Lectures deliver the fundamental technical concepts; recitations show you how those concepts are applied to real systems. virtual memory bounded buffers (virtualize communication links) threads (virtualize processors) modularity and abstraction in networking: layering an abundance of hierarchy and 1970s: ARPAnet 1978: flexibility and layering early 80s: growth change late 80s: growth problems 1993: commercialization hosts. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). The exam will be "open book", which means you can use any printed or written. 1800 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. 1800 Spring 2023 Lecture #1: Complexity, modularity, abstraction plus an intro to client/server models pronounce this “six one eighty” (trust me) this class used to be numbered 6. Design Project Hands-ons. 1800 G 3-6-3 Design and implementation of secure computer systems. Prereq: Permission of instructor U (Fall, IAP, Spring, Summer)Units arranged [P/D/F]Can be. The total viewing time is ten minutes. It does not mean that you need to have mastered the content in the paper before recitation; we expect you to come with many questions. This project is where the students get to design their own system, which is the primary objective of this course. , when congestion is limited, it reduces its congestion window. 1800 Spring 2023 Calendar Information. 1800 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. 1800 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. Cambridge, MA 02139. To help as you read: Sections 2 and 3 give a very good overview of the necessary background, and a toy example to help you understand the basic attack. , when congestion is limited, it reduces its congestion window. Exam 1 Logistics The first exam in 6. 1800 | Lecture 19. 30% for Exams (two @ 15% each) 5% for Hands-ons. 1800 2023 operating systems enforce modularity on a single machine using virtualization in order to enforce modularity + have an effective operating system, a few things need to happen 1. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). Lectures cover attacks that compromise security as well as. Katrina LaCurts | [email protected], students are able to design their own distributed systems to solve real-world problems. In tutorial, you'll learn communication skills to help you reason about systems, and describe and defend your own. out < N: bb. For Fall 2023 (and possibly in future semesters) you may petition to. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). Read End-to-end Arguments in System Design. The required subjects covering complexity (18. programs can send and receive messages via this buffer // send a message by placing it in bb send(bb, message): while True: if bb. 77 Massachusetts Ave. If you're unsure where to go with a question, just drop by office hours or email any member of the staff (your TA is a great point of contact). This paper uses the term man-in-the-middle (MITM) attack. edu. 6. 3, 5. Katrina LaCurts | [email protected], 4. 6. 1800 will be on April 6, 7:30pm-9:30pm, in either 26-100 or 34-101. edu) for help. edu | 6. Topics include virtual memory, threads, context switches, kernels, interrupts, system calls, interprocess communication, coordination, and the interaction between software and hardware. Phone: +1 617 253 4613. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). Akamai's headquarters are right down the street from MIT. 1800 covers four units of technical content: operating systems, networking, distributed systems, and security. Katrina LaCurts | [email protected], and 5. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 404J or 18. This course was renumbered from 18. The exam will be "open book", which means you can use any printed or written. His home directory contains exactly three files: X. [email protected] | 6. Your answers to these questions should be in your own words, not direct quotations from the paper. Read "Staring into the Abyss: An Evaluation of Concurrency Control with One Thousand Cores”; skip Sections 4. This means doing the reading beforehand, turning in the question before recitation, etc. Further, DCTCP provides a smooth reaction to congestion, i. 6. 1810: Learning by doing. 1800 covers four units of technical content: operating systems, networking, distributed systems, and security. 1800 Spring 2023 Calendar Information. edu Questions? 61600-staff@csail. txt, and Y. If your last name starts with letters A-O, go to 26-100; P-Z, go to 34-101. Download PDF of this Page. Download Course. Hands-on 2: UNIX. 1800 2023 modern linux has protections in place to prevent the attacks on the previous slides, but there are counter-attacks to those protections bounds-checking is one solution, but it ruins the ability to create compact C code (note the trade-off of security vs. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Many Internet applications, such as peer-to-peer applications are built as overlay networks. Individual laboratory assignments involve. To help as you read: Sections 2 and 3 give a very good overview of the necessary background, and a toy example to help you understand the basic attack. Your TA will be in touch about exactly how to turn that in. edu | 6. What are my prospects? Much of the learning experience in 6. 033 consists of three components: technical material, communication/system design and analysis, and participation. 6, and 7. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). You can accumulate that experience in various ways: UROPs, other classes, summer jobs, more interaction with systems such as Athena, etc. 676 is not offered this semester (Fall 2023). Her office hours are 11am-12pm on Thursdays except on 3/23, 4/27, and 5/18 when they'll be 1:00pm-2:00pm. Each of these components comprises roughly one third of your grade, according to the following breakdown: 35%: Technical Material. edu | 6. 6. edu Teaching Assistants Ben Kettle BK [email protected] | 6. 1800 2023 a hash function H takes an input string of arbitrary size and outputs a fixed-length string H is deterministic: if x1 = x2, then H(x1) = H(x2) interlude: hash functions hash functions are not normal functions! they have a number of exciting properties H is collision-resistant: if x1 ≠ x2, then theFor each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). This is paper written by MIT authors in 2014, and published in VLDB (one of the top two conferences in the databases field). 1800 Spring 2023 Lecture #1: Complexity, modularity, abstraction plus an intro to client/server models pronounce this “six one eighty” (trust me) this class used to be numbered 6. 1800 | Lecture 23. Program of research leading to the writing of an MEng thesis; to be arranged by the student and an appropriate MIT faculty member. edu | 6. 6. *Katrina is the only person with a complicated office hours schedule. Meltdown, along with Spectre, is a security vulnerability that was discovered in 2018 that affected all modern Intel processors at the time. edu | 6. The exam will be "open book", which means you can use any printed or written. In tutorial, you'll learn communication skills to help you reason about systems, and describe and defend your own. Since this is a class where we study real systems, students get more out of 6. virtual memory bounded buffers (virtualize communication links) threads (virtualize processors) modularity and abstraction in networking: layering an abundance of. , Room 38-476. 1800 Spring 2023 Lecture #1: Complexity, modularity, abstraction plus an intro to client/server models pronounce this “six one eighty” (trust me) this class used to be numbered 6. The Introduction of the paper highlights the goals of the system and Section 2 discusses what the authors identify as their design principles. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). The title of the paper is based on a famous quote: For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). g. edu | 6. edu) for help. 1800 | Lecture 16. Skim Sections 5, 6, and 8 (i. Students work in teams on self-proposed maker-style design projects with a focus on fostering creativity, teamwork, and debugging skills. 1800 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. Topics include virtual memory, threads, context switches, kernels, interrupts, system calls, interprocess communication, coordination, and the interaction between software and. 1800 will be on April 6, 7:30pm-9:30pm, in either 26-100 or 34-101. ) The exam will cover all material from Lecture 1 - Recitation 13. In tutorial, you'll learn communication skills to help you reason about systems, and describe and defend your own. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). , streaming video). programs should be able toIf you have any trouble accessing any of these materials, please reach out to Katrina (lacurts@mit. 77 Massachusetts Avenue Cambridge, MA 02139-4307. You can enable closed. This is outdated language that the community is moving away from (see here and here for examples of alternate terms). 1800 2023 operating systems enforce modularity on a single machine using virtualization in order to enforce modularity + have an effective operating system, a few things need to happen 1. Lectures are based on a study of UNIX and research papers. Katrina LaCurts | [email protected] of Subject Requirements Subjects; Science Requirement: 6: Humanities, Arts, and Social Sciences (HASS) Requirement [two subjects can be satisfied by 6. It leverages the Explicit Congestion Notification (ECN) to obtain an early congestion feedback from routers/switches, before the queue drops packets. , lecture question and reading answer) (together 10%). edu | 6. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). mit. The PDF includes all information on this page and its related tabs. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 1800 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. Juniors have an additional year of such experience. Hands-ons. Katrina LaCurts. 9800 Independent Study in Electrical Engineering and Computer Science. edu Yael Tauman Kalai 32-G682 tauman@mit. 1800 2023 6. This is paper written by MIT authors in 2014, and published in VLDB (one of the top two conferences in the databases field). Read Chapter 2 of Dave Clark's book "Designing an Internet". Katrina LaCurts | [email protected]) and algorithms (18. performance)6. 1800, 6. In 6. 6. ) For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Katrina LaCurts | lacurts@mit. Topics include operating system security, privilege separation, capabilities, language-based security. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 033, and ran under that number for literal decades (since before I was born!), so please forgiveGetting Help. 1800 2023 our goal is to build reliable systems from unreliable components. 1800 Learning Objectives. Section 2-4 of the paper describe the design of GFS, Section 5 discusses how GFS handles failures, and Sections 6-7 detail their evaluation and real-world usage of GFS. The ability to design one's own distributed system includes an ability to justify one's design choices and assess the impact of their systems on different stakeholders. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 1800 comes from participating in recitation discussions of assigned papers. in <- bb. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 5120, ending in a zero that will be removed in a few years. Section 2-4 of the paper describe the design of GFS, Section 5 discusses how GFS handles failures, and Sections 6-7 detail their evaluation and real-world usage of GFS. 1810: Learning by doing. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Meltdown, along with Spectre, is a security vulnerability that was discovered in 2018 that affected all modern Intel processors at the time. Download PDF of this Page. Outline. 1800 2023 operating systems enforce modularity on a single machine using virtualization in order to enforce modularity + have an effective operating system, a few things need to happen 1. The hands-ons are short, low-stress (we hope) assignments designed to reinforce some of the abstract concepts from the lectures and recitation, and to let you find out how things really work. The second exam in 6. , gates, instructions, procedures, processes) and their mechanization using lower-level elements. This means doing the reading beforehand, turning in the question before recitation, etc. MIT catalog description Prereq. These days, we typically use the term on-path attacker (or sometimes person-in-the-middle attack). Watch the following two instructional videos prior to this week's tutorial. 1800 covers four units of technical content: operating systems, networking, distributed systems, and security. * Our department at MIT is in the midst of a global subject renumbering, so the official number is 6. Watch the following two instructional videos prior to this week's tutorial. In tutorial, you'll learn communication skills to help you reason about systems, and describe and defend your own. A large part of your grade depends on that participation, which you cannot make up. Katrina LaCurts | [email protected], 4. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). (If you're having trouble accessing the paper,. A large part of your grade depends on that. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). edu | 6. Note that this chapter uses the term router where we will often use switch. Cambridge, MA 02139. 1800 scheduled for a three-hour slot, but the exam is only two hours, just like the first exam. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 1800 2023 a hash function H takes an input string of arbitrary size and outputs a fixed-length string H is deterministic: if x1 = x2, then H(x1) = H(x2) interlude: hash functions hash functions are not normal functions! they have a number of exciting properties H is collision-resistant: if x1 ≠ x2, then the For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Katrina LaCurts | lacurts@mit. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 410J) provide an introduction to the most theoretical aspects of computer science. 1800 | Lecture 26. g. 1800 covers four units of technical content: operating systems, networking, distributed systems, and security. 6, and 7. 3900, or 6. You can enable closed-captioning on the videos by clicking the [CC] button. This paper uses the term man-in-the-middle (MITM) attack. For this recitation, you'll be reading most of Resilient Overlay Networks. , Room 38-476. 1800 2023 network intrusion detection systems: attempt to detect network attacks so that users can then prevent them (detection is the first step to prevention) botnets are sophisticated, so we can’t rely on just blocking “bad” IP addresses signature-based NIDS match traffic against known signaturesThis is your third file system; you have now read about the Unix Filesystem, GFS, and now ZFS. Katrina LaCurts | [email protected]) provide an introduction to the most theoretical aspects of computer science. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Read "Keys Under Doormats: Mandating Insecurity by Requiring Government Access to all Data and Communications" by Abelson et al. Katrina LaCurts | lacurts@mit. Katrina LaCurts | lacurts@mit. MIT catalog description. Lectures deliver the fundamental technical concepts;. In parts of the paper, you'll see references to public-key cryptography. pronounce this “six one eighty” (trust me) 6. After 6. Slides: all animations, limited animations. This course studies fundamental design and implementation ideas in the engineering of operating systems. It does not mean that you need to have mastered the content in the paper before recitation; we expect you to come with many questions. Read "Staring into the Abyss: An Evaluation of Concurrency Control with One Thousand Cores”; skip Sections 4. This means doing the reading beforehand, turning in the question before recitation, etc. 1800 Spring 2023, Exam 1 Page 3 of 11 2. This class covers topics on the engineering of computer software and hardware systems. It covers the topics including multilevel implementation strategies, definition of new primitives (e. If you have any trouble accessing any of these materials, please reach out to Katrina (lacurts@mit. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Katrina LaCurts | [email protected] | 6. Assignments. Read End-to-end Arguments in System Design. We post slides with all animations (good for following along exactly) and with limited animations (good for studying/taking notes on). 5831 are based on the same quizzes and assigments as 6. Become a reviewer: To learn more about becoming a reviewer of textbooks, please fill out this form and we will be in touch. Print this page. Get Help. 6. edu | 6. programs should be able toKatrina LaCurts | lacurts@mit. After reading section 6, you should understand the basics of the shell. The overall program must consist of subjects of essentially different content, and must include at least five Course 18 subjects with a first decimal digit of 1 or higher. 1800 2023 a hash function H takes an input string of arbitrary size and outputs a fixed-length string H is deterministic: if x1 = x2, then H(x1) =. edu | 6. Katrina LaCurts | [email protected] will be on April 6, 7:30pm-9:30pm, in either 26-100 or 34-101. This is outdated language that the community is moving away from (see here and here for examples of alternate terms). Opportunity for independent study at the undergraduate level under regular supervision by a faculty member. 6. The total viewing time is ten minutes. 5830, except that students may opt to do one additional (more exploratory) lab in place of the final project. 40%: 6. Section 3 lays out each of RON's design goals. e. 1800 Spring 2023 Lecture #9: Routing distance-vector, link-state, and how they scaleFor each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). 1800 Spring 2023 Lecture #2: Naming plus a case-study on DNS6. programs shouldn’t be able to refer to (and corrupt) each others’ memory 2. Katrina LaCurts | [email protected] | 6. Katrina LaCurts | [email protected] 2023 link network transport application the things that actually generate traffic sharing the network, reliability (or not) examples: TCP, UDP 1993: commercialization policy routing naming, addressing, routing examples: IP communication between two directly-connected nodes examples: ethernet, bluetooth. 5830 is a Grad-H class. 6. 6. Lectures deliver the fundamental technical concepts; recitations show you how those concepts are applied to real systems. Request a digital copy: Learn how to request a digital copy. For each lecture, we'll post slides and an outline before class (not necessarily at 9:00am, but we aim for a few hours ahead of time). Students will learn the theory and practice of (1) urban planning and policy-making including ethics and justice; (2) statistics, data science, geospatial analysis, and visualization, and (3) computer science, robotics, and machine. Note that this paper uses the term "master". 1800 2023 our goal is to build reliable systems from unreliable components. Restricted to MEng graduate students. Katrina LaCurts | lacurts@mit. Before Recitation. Katrina LaCurts | lacurts@mit. edu | 6. The exam will cover all material from Lecture 15 - Recitation 26. Before reading the paper, check out two very helpful websites, which have some useful. edu | 6. 6. txt, XY. DNSSEC is not yet wideaspread. edu | 6.