Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings

Front Cover
Piotr Gaj, Michał Sawicki, Grażyna Suchacka, Andrzej Kwiecień
Springer, Jun 5, 2018 - Computers - 446 pages
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
 

Contents

The Method of Determining the Optimal Communication Structure
3
Researching Measured and Modeled Traffic with Selfsimilar Properties for AtebModeling Method Improvement
13
A Validation Method of a Real Network Device Model in the Riverbed Modeler Simulator
26
Energy Efficient MPTCP Transmission Over Channels with a Common Bottleneck
40
LightWeight Congestion Control for the DCCP Protocol for RealTime Multimedia Communication
52
On Improving Communication System Performance in Some Virtual Private Networks
64
New SDNOriented Authentication and Access Control Mechanism
74
Full Network Coverage Monitoring Solutions The netBaltic System Case
89
Adaptation of the NGREEN Architecture for a Bursty Traffic
232
The Model of the DWDM Access Node
245
A Queueing Model of the Edge Node in IP over AllOptical Networks
258
Multiserver Queueing System with Nonhomogeneous Customers and Sectorized Memory Space
272
GPU Accelerated Noninteger Order PID Controller Used as AQM Mechanism
286
Consequences of the Form of Restrictions in Coloured Petri Net Models for Behaviour of Arrival Stream Generator Used in Performance Evaluation
300
Transient Queueing Delay in a FiniteBuffer BatchArrival Model with Constant Repeated Vacations
311
Cybersecurity and Quality of Service
321

A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks
103
A New Approach for SDN Performance Enhancement
115
Quantum Coherence Measures for Quantum Switch
130
Performance Evaluation of Web Sites Using HTTP11 and HTTP2
142
Teleinformatics and Telecommunications
158
Modified OMP Algorithm for Compressible Channel Impulse Response Estimation
159
Evaluation of the Jammers Performance in the WiFi Band
171
LTE Load Balancing with Tx Power Adjustment and the Real Life Mobility Model
183
Determining the Usability of Embedded Devices Based on Raspberry Pi and Programmed with CODESYS as Nodes in Networked Control Systems
193
The Method of Isochronous Cycle Duration Measurement for Serial Interface IEEE 1394A
206
Queueing Theory
216
Time to Buffer Overflow in a Queueing Model with Working Vacation Policy
217
Cache Enhanced Anonymity Systems Against Probabilistic Attacks
323
The Impact of Time Parameters on the Security Protocols Correctness
333
On Some Time Aspects in Security Protocols Analysis
344
A Note on Keys and Keystreams of Chacha20 for Multikey Channels
357
Security Considerations of Modern Embedded Devices and Networking Equipment
373
Selfadaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks
385
QoS and EnergyAware Services Management of Resources in a Cloud Computing Environment
402
Maximum Lifetime of the Wireless Sensor Network and the Gossip Problem
414
Wireless Network with Bluetooth Low Energy Beacons for Vehicle Detection and Classification
429
Author Index
445
Copyright

Other editions - View all

Common terms and phrases