Review for Final Exam
The final exam will take place on Tuesday May 11th, 2016, between the hours of 3:30 p.m. to 6:30 p.m. in our classroom (Dana 132.)
The final exam will be comprehensive. You are allowed to bring three letter-sized sheets of information with hand-written contents on it (double-sided if you wish), no printed information is allowed during the exam. Two of the three sheets should be the ones you used in your two mid-term exams. You will need pens or pencils, and possibly an eraser if you use a pencil. You will not need a calculator or any other computing devices.
The following is a list of topics we covered the since the second mid-term exam. For a list of topics before, please refer to the first review and the second review.
- Mobility and mobile IP (chapter 6)
- Registration
- Home agent, foreign agent
- Indirect routing, direct rouging
- Basic mobile IP protocol
- Use of ICMP to facilitate mobile IP
- Agent discovery
- Mobility across network boundary
- Goals of network security: confidentiality, integrity, authentication, and accessibility (Chapter 8)
- Types of security attacks (Chapter 8)
- Symmetric key cryptography, DES and AES (Chapter 8)
- Public key encryption (Chapter 8)
- Advantages of public key encryption
- RSA: a particular example of public key encryption
- The basis on which RSA is secure
- Message Authentication Code (MAC) (Chapter 8)
- Digital signature (Chapter 8)
- SSL (Chapter 8)
- Properties of video and audio communication (Chapter 7)
- UDP media stream (Chapter 7)
- HTTP media stream (Chapter 7)
- DASH protocol (Chapter 7)