{"updated":"2025-01-22T10:25:55.661280+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00044524","sets":["1164:3925:3931:3935"]},"path":["3935"],"owner":"1","recid":"44524","title":["アドホックネットワークのためのチェックポイントプロトコルと評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2007-03-02"},"_buckets":{"deposit":"1c2f9ed2-f9fc-4f7e-b5d2-7f66790f7659"},"_deposit":{"id":"44524","pid":{"type":"depid","value":"44524","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"アドホックネットワークのためのチェックポイントプロトコルと評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アドホックネットワークのためのチェックポイントプロトコルと評価"},{"subitem_title":"Evaluation of Checkpoint Protocol for Mobile Ad Hoc Network","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2007-03-02","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学 理工学部 情報システム工学科"},{"subitem_text_value":"東京電機大学 理工学部 情報システム工学科"},{"subitem_text_value":"東京電機大学 理工学部 情報システム工学科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Computers and Systems Engineering Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Computers and Systems Engineering Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Computers and Systems Engineering Tokyo Denki University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/44524/files/IPSJ-CSEC07036050.pdf"},"date":[{"dateType":"Available","dateValue":"2009-03-02"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC07036050.pdf","filesize":[{"value":"650.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"3f356029-1b9d-41d1-951f-248d5ce24c62","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2007 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小野, 真和"},{"creatorName":"桧垣, 博章"},{"creatorName":"古田, 勝久"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masakazu, ONO","creatorNameLang":"en"},{"creatorName":"Hiroaki, HIGAKI","creatorNameLang":"en"},{"creatorName":"Katsuhisa, FURUTA","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"分散コンピューティング環境において耐故障性を実現する手法として、従来の固定ネットワーク環境ではチェックポイントリカバリプロトコルが提案されてきた。チェックポイントリカバリプロトコルでは、状態情報を格納する安定記憶の存在と、メッセージの送信元コンピュータと送信先のコンピュータの同期による一貫性のないメッセージ(紛失メッセージ、孤児メッセージ)の検出、回避が十分に可能な通信帯域の存在が前提となっている。本論文では、これらの前提条件が成立しない、移動コンピュータのみで構成されるようなアドホックネットワークに注目し、アドホックネットワークにおけるチェックポイントリカバリプロトコルを提案する。本提案では移動コンピュータの状態情報を複数の隣接移動コンピュータに保存する。また、転送中に送信先において紛失メッセージとなる可能性のあるメッセージを紛失可能性メッセージとして中継移動コンピュータで保存する。このとき、中継移動コンピュータの状態情報の一部として記憶することにより、状態情報とメッセージログを同一の移動コンピュータに同時に保存することができる。これによって、チェックポイントプロトコルの開始から終了までに要する時間を短縮することが可能である。","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"For achieving mission-critical network applications, checkpoint recovery protocols have been researched and developed. In coventional protocols for wired networks, stable storages to store state information are assumed and enough bandwidth is assigned to synchronize a sender and a receiver computers of a message in order to avoid that the message becomes inconsistent, i.e. neither orphan nor lost. In this paper, we propose a novel checkpoint protocol in ad hoc networks without stable storage and enough communication bandwidth. Here, a checkpoint request message is delivered by flooding. State information of a mobile computer is carried by this message and stored into neighbor mobile computers. A candidate of a lost message is detected and stored by intermediate mobile computer on its transmission route. Here, communication overhead for taking global checkpoint is reduced.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"296","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"291","bibliographicIssueDates":{"bibliographicIssueDate":"2007-03-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"16(2007-CSEC-036)","bibliographicVolumeNumber":"2007"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"created":"2025-01-18T23:10:40.840737+00:00","id":44524,"links":{}}