Escolar Documentos
Profissional Documentos
Cultura Documentos
CSE410
Ques1:- In order to enhance your web page, you decide to introduce color into it.
Show how you could direct the html interpreter in a browser to make the
background color yellow, text in the page orange, each link red, and a visited link
blue.
Ques 2:-With the aid of an example, explain the meaning of “Absolute URL”
and “relative URL” including the relationship between the two.
This web site has several sections and the files and web pages for each section
have been segregated into different directories. This helps me to keep things
organized and uncluttered on the web site. Under the document or server root
directory (the main directory of the web site), I have a directory called images
which stores all common images used on the pages of this web site. The image
email.gif resides in this directory. I have another directory called design which is
at the same level as images i.e. it is also in the document root directory.
For example:
http://www.google.com/images/mmc.jpg specifies an image file mmc.jpg in
the images directory, under www.webdevelopersnotes.com domain name.
Similarly, the absolute URL of the document you are viewing is
http://www.google.com/mmc.php3 which is a page in the directory
called design on this web site.
If the file you want to link to is in a subdirectory of the directory the referring
page is in, you need to enter only the directory information and the name of the
file. So if mmchtml were in the mmc subdirectory of your www directory, you
could refer to it from your home page by using:
<a href="mmc\mmc.html">MMC!</a>
If the file you want to link to is in a higher directory than the referring page, use ..
, which means to go up a directory. For example, to link from mmc.html to
home.html, which is in the directory above, you would use:
<a href="..mmc.html">MMC</a>
<img src="http://www.google.com/images/mmc.jpg"
width="..." height="..." />
Answer:
Answer: Small cells have advantages for constant bit rate traffic but disadvantages
Protocol connection identifier (PCI) :the virtual circuit identifier used on each link
.
The PCI is made up of virtual path identifier (VPI) and virtual channel identifier
(VCI)
Cell loss priority(CLP):in ATM cell format, it enable the user to specify a
preference as to which cells should be discarded.
Switch Architectures:-
Input controller (IC): Involves a simple look-up and mapping operation
of the VPI/VCI in the header of the incoming cell into the corresponding
output VPI/VCI
Buffering is provided in the IC or output controllers to hold
simultaneously arriving cells
Control processor is to download routing information into the routing
tables in each IC
Switch fabrics can be classified as either time division or space division
In a time-division switch, a time-division backplane bus is capable of
transferring N cells in a single cell arrival time.
Part-B
To avoid abuses, these organisations have imposed a set of rules for these
frequency bands and only the products certified to conform to those rules are
allowed to emit in the bands. These rules specify at least the maximum power
transmitted in the band and the out of band emissions (to not pollute adjacent
bands). The ISM bands rules specify as well that Spread Spectrum has to be used
(either Direct Sequence or Frequency Hopping), and how the channels are
defined, to allow the peaceful cohabitation of different systems.
Multi-rate systems
If you want a better throughput, the most simple way is to use more bandwidth.
The problem is that the ISM spread spectrum regulations limits the amount of
bandwidth usable (1 MHz channels for Frequency Hopping). Also, in most
hardware the filters used to recover the signal are fixed, so the channel width is
fixed. This limit the rate of symbols that you can use (1 Mbauds for Frequency
Hopping).
When 802.11 was eventually released, 1 and 2 Mb/s was no longer considered as
decent speed for Wireless LAN and people were already talking of using the 5
GHz band for higher throughput (HiperLan and 802.11 at 5 GHz).
OFDM
OFDM use a set of subcarrier frequencies, the frequencies being orthogonal. Each
subcarrier is modulated individually, the bit rate and signal strength of each
subcarrier can be adapted to get maximum performance of the system (we put
more bits on the good subcarriers and less on the bad ones).
Answer:
In the schematic diagram (a) of the encryption operation shown above we can see
that each 64-bit block of plain text passes through a series of eight bit-
manipulation iteration followed by a final transposition. At each of the eight
iterations, each of the 64 output bits is a function of all 64 input bits. The various
processing operations that are carried out to achieve this are shown in figure (b).
The 128-bit key is first used to generate 52 subkeys each of 16 bits. As we can see
in the figure, six subkeys are used at each iteration and remaining four subkeys are
used in the final transposition stage. Decryption uses the same algorithm but with
a modified set of keys.
Consider a router with two interface cards, one connected to a public network
PUBNET and one connected to a private network PRIVNET. We want to hide a
server machine on the PRIVNET network but have it accessible from the
PUBNET network. The IP address of the server machine lies in the PUBNET
network, even though we are placing the machine on the PRIVNET network
behind the router. By enabling proxy ARP on the router, any machine on the
PUBNET network that issues an ARP "who has" request for the server's MAC
address will get a proxy ARP reply from the router containing the router's MAC
address. This tells machines on the PUBNET network that they should be sending
packets destined for the server via the router. The router forwards the packets
from the machines on the PUBNET network to the server on the PRIVNET
network. Similarly, when the server on the PRIVNET network issues a "who has"
request for any machines on the PUBNET network, the router provides its own
MAC address via proxy ARP. This tells the server to send packets for machines
on the PUBNET network via the router. The router forwards the packets from the
server on the PRIVNET network to the machines on the PUBNET network. The
proxy ARP provided by the router allows the server on the PRIVNET network to
appear to be on the PUBNET network. It lets the router pass ARP requests and
other network packets in both directions between the server machine and the
PUBNET network, making the server machine appear to be connected to the
PUBNET network even though it is on the PRIVNET network hidden behind the
router.