Review for Final Exam
The final exam will take place on Tuesday May 11th, 2016, between the hours of 3:30 p.m. to 6:30 p.m. in our classroom (Dana 132.)
The final exam will be comprehensive. You are allowed to bring three letter-sized sheets of information with hand-written contents on it (double-sided if you wish), no printed information is allowed during the exam. Two of the three sheets should be the ones you used in your two mid-term exams. You will need pens or pencils, and possibly an eraser if you use a pencil. You will not need a calculator or any other computing devices.
The following is a list of topics we covered the since the second mid-term exam. For a list of topics before, please refer to the first review and the second review.
  -  Mobility and mobile IP (chapter 6) 
        -  Registration
-  Home agent, foreign agent
-  Indirect routing, direct rouging
-  Basic mobile IP protocol
-  Use of ICMP to facilitate mobile IP
-  Agent discovery 
-  Mobility across network boundary 
-  Goals of network security: confidentiality, integrity, authentication, and accessibility (Chapter 8)
-  Types of security attacks (Chapter 8) 
-  Symmetric key cryptography, DES and AES  (Chapter 8)
-  Public key encryption  (Chapter 8)
        -  Advantages of public key encryption
-  RSA: a particular example of public key encryption
-  The basis on which RSA is secure
-  Message Authentication Code (MAC)  (Chapter 8)
-  Digital signature  (Chapter 8)
-  SSL  (Chapter 8)
-  Properties of video and audio communication (Chapter 7)
-  UDP media stream (Chapter 7)
-  HTTP media stream (Chapter 7)
-  DASH protocol (Chapter 7)