the last chance

我想,在事业上,这是我最后一次的机会了。好像突然失去了一点底气,遥想当年,可是信心满满的,轻取第一是常事哦。也许现实会把人的信心逐渐削去,当年的铁马金戈,当年麾下的将士,现在你们可好啊!!!

用一首悲叹的词来表不老的决心,壮士百折不饶啊!!!

为了幸福的生活……我们继续在路上……

 

《破阵子》

辛弃疾

醉里挑灯看剑,梦回吹角连营。

八百里分麾下炙,五十弦翻塞外声。沙场秋点兵。

马作的卢飞快,弓如霹雳弦惊。

了却君王天下事,赢得生前身后名。可怜白发生!

详细总结、解析、举例分析下面的英文材料: Hidden node problem The distributed nature of channel access in 802.11 WLANs makes the carrier sense mechanism critical for collision free operation. The physical carrier sense, which logi cally resides in the PHY, is responsible for detecting the transmissions of other stations. However, in some situations it may not be possible for the physical carrier sense to detect the transmissions of all stations. Consider the situation in Figure 8.10 where there is data transfer between STA 1 and the AP. Transmissions from STA 1 can be detected by the APandSTA2.Adistantnode,STA3,candetecttransmissions from the AP but not from STA 1. STA 3 is a hidden node with respect to communication between STA 1 and the AP. When STA 1 transmits a frame to the AP there is a chance that STA 3 would still see the medium as idle and also begin a frame transmission. Network allocation vector (NAV) One mechanism defined to overcome the hidden node problem is the network allocation vector (NAV). The NAV is a function that logically resides in the MAC and provides a virtual carrier sense to augment the physical carrier sense. Each MAC frame carries a Duration field that is used to update the NAV in any station other than the addressed station that successfully demodulates the frame. The Duration field holds a time value that indicates the duration for which the sending station expects the medium to be busy referenced from the end of the last symbol of the PPDU carrying the MAC frame. All frames2 include the Duration field and may set the NAV in neighboring stations. However, to do so the frame must be successfully demodulated by the neighboring stations. The NAV is most effectively set in neighboring stations using robustly modu lated control frames, such as the RTS/CTS exchange, rather than data frames. RTS/CTS frame exchange To protect a station’s transmissions from hidden nodes, a station may begin a sequence with an RTS/CTS exchange as illustrated in Figure 8.11. The RTS (request to send) is sent by the initiator (STA 1) and the station addressed by the RTS (STA 2) responds with a CTS (clear to send). The RTS frame occupies less air time than the data frame and is thus less susceptible to collision than the longer data frame transmitted alone. Also, loss of the RTS to collision would be quickly detected. The RTS and CTS are robustly modulating so that they are broadly received. The Duration field of the RTS frame carries a NAV setting to cover the CTS response plus the time needed for the subsequent frame exchange. The CTS response has its Duration field set to the Duration field value seen in the RTS less SIFS andthe duration of the CTS response itself. In the diagram, the hidden node (STA 3) would receive the CTS frame and set its NAV to defer for the subsequent frame exchange. STA 2 sees both the RTS and CTS. The RTS/CTS exchange is required when the length of a data or management frame exceeds the threshold set by the dot11RTSThreshold attribute. The dot11RTSThreshold is a local management attribute and may be set to 0 so that all MPDUs are delivered with an RTS/CTS exchange, to the maximum allowed MPDU length so that the RTS/CTS need not be used at all, or any value in between. EIFS Another mechanism used to protect against hidden nodes is the extended inter-frame space (EIFS). A station uses EIFS instead of DIFS to defer if a frame is detected but not correctly received, i.e. the MAC determines that the frame check sequence (FCS) is invalid. EIFS is defined as: EIFS ¼ aSIFSTimeþACKTxTimeþDIFS ð8:3Þ where ACKTxTime is the time required to transmit an ACK frame at the lowest mandatory PHY data rate. EIFS is intended to prevent a station from transmitting over the ACKofahiddennodewhenastationisunable todemodulate the data frameand thus correctly set its NAV. If during the EIFS defer a valid frame is received (for example, the ACK) then a DIFS defer is used following the actual frame instead of continuing with EIFS. EIFS usage is illustrated in Figure 8.12
最新发布
08-21
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值