{"created":"2023-05-15T12:35:52.303654+00:00","id":760,"links":{},"metadata":{"_buckets":{"deposit":"b39da471-50a8-403b-8e07-697e562431cf"},"_deposit":{"created_by":2,"id":"760","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"760"},"status":"published"},"_oai":{"id":"oai:kutarr.kochi-tech.ac.jp:00000760","sets":["12"]},"author_link":["2065","2066","2063","2064"],"item_8_alternative_title_19":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Proposal of a addressing mechanism for ad-hoc network"}]},"item_8_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2007-05-10","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"38","bibliographicPageEnd":"110","bibliographicPageStart":"105","bibliographicVolumeNumber":"2007","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. DSM, [分散システム/インターネット運用技術]"}]}]},"item_8_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"アドホックネットワークは1990年代末以降活発に研究がなされてきた。現在、アドホックネットワークの課題として経路探索に伴うノード検索パケットによるネットワーク帯域の消費がある。この間題に対する一つの解決手法としてノードに位置情報としての意味を持たせ、それを基にルーティングを行うGreedyルーティングプロトコルと呼ばれるプロトコル群がある Greedyルーティングプロトコルでは位置情報を基にルーティングを行うためルーティングアルゴリズムとは別にネットワーク内の端末にアドレスを割り当てる機構が組み込まれている場合があるが、既存手法では位置情報として地理的な情報を元にしているためノード間の接続状況を反映したものとはならない。そこで本報告ではノードの位置情報と接続情報を考慮ことで既存の割当手法に比べ破棄パケットの発生を低減する手法\nを提案する。\nProm the end of 1990's, lots of researchers have discussed the ad-hoc networks. We consider that searching node packets to establish a path to a destination node in ad-hoc networks consume network bandwidth. Several Greedy forwarding protocols, which axe based on information of node location, have been proposed to solve this problem. Greedy forwarding protocol usually has addressing mechanism that assigns IP address according to location information of nodes. However, the information of existing techniques does not reflect link state. In this report, we propose a mechanism for addressing, which lowers rate of loss packets than existing mechanism with the position information reflection of link state.","subitem_description_type":"Abstract"}]},"item_8_publisher_33":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_8_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"ここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。\nNotice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_8_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11559681","subitem_source_identifier_type":"NCID"}]},"item_8_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0919-6072","subitem_source_identifier_type":"ISSN"}]},"item_8_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"石本, 一生"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"植田, 和憲"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"ISHIMOTO, Issei"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"UEDA, Kazunori"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-02-13"}],"displaytype":"detail","filename":"ipsj_2007_38_105.pdf","filesize":[{"value":"646.5 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ipsj_2007_38_105.pdf","url":"https://kutarr.kochi-tech.ac.jp/record/760/files/ipsj_2007_38_105.pdf"},"version_id":"ef6f6e35-d979-43c0-b8c4-01cd17db86c4"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"technical report","resourceuri":"http://purl.org/coar/resource_type/c_18gh"}]},"item_title":"アドホックネットワークにおけるアドレス割当手法の提案","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アドホックネットワークにおけるアドレス割当手法の提案"}]},"item_type_id":"8","owner":"2","path":["12"],"pubdate":{"attribute_name":"公開日","attribute_value":"2007-12-27"},"publish_date":"2007-12-27","publish_status":"0","recid":"760","relation_version_is_last":true,"title":["アドホックネットワークにおけるアドレス割当手法の提案"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2023-05-15T13:27:15.057585+00:00"}