Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, ProceedingsPiotr Gaj, Michał Sawicki, Grażyna Suchacka, Andrzej Kwiecień Springer, 2018 M06 5 - 446 pages This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service. |
Contents
3 | |
13 | |
A Validation Method of a Real Network Device Model in the Riverbed Modeler Simulator | 26 |
Energy Efficient MPTCP Transmission Over Channels with a Common Bottleneck | 40 |
LightWeight Congestion Control for the DCCP Protocol for RealTime Multimedia Communication | 52 |
On Improving Communication System Performance in Some Virtual Private Networks | 64 |
New SDNOriented Authentication and Access Control Mechanism | 74 |
Full Network Coverage Monitoring Solutions The netBaltic System Case | 89 |
Adaptation of the NGREEN Architecture for a Bursty Traffic | 232 |
The Model of the DWDM Access Node | 245 |
A Queueing Model of the Edge Node in IP over AllOptical Networks | 258 |
Multiserver Queueing System with Nonhomogeneous Customers and Sectorized Memory Space | 272 |
GPU Accelerated Noninteger Order PID Controller Used as AQM Mechanism | 286 |
Consequences of the Form of Restrictions in Coloured Petri Net Models for Behaviour of Arrival Stream Generator Used in Performance Evaluation | 300 |
Transient Queueing Delay in a FiniteBuffer BatchArrival Model with Constant Repeated Vacations | 311 |
Cybersecurity and Quality of Service | 321 |
A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks | 103 |
A New Approach for SDN Performance Enhancement | 115 |
Quantum Coherence Measures for Quantum Switch | 130 |
Performance Evaluation of Web Sites Using HTTP11 and HTTP2 | 142 |
Teleinformatics and Telecommunications | 158 |
Modified OMP Algorithm for Compressible Channel Impulse Response Estimation | 159 |
Evaluation of the Jammers Performance in the WiFi Band | 171 |
LTE Load Balancing with Tx Power Adjustment and the Real Life Mobility Model | 183 |
Determining the Usability of Embedded Devices Based on Raspberry Pi and Programmed with CODESYS as Nodes in Networked Control Systems | 193 |
The Method of Isochronous Cycle Duration Measurement for Serial Interface IEEE 1394A | 206 |
Queueing Theory | 216 |
Time to Buffer Overflow in a Queueing Model with Working Vacation Policy | 217 |
Cache Enhanced Anonymity Systems Against Probabilistic Attacks | 323 |
The Impact of Time Parameters on the Security Protocols Correctness | 333 |
On Some Time Aspects in Security Protocols Analysis | 344 |
A Note on Keys and Keystreams of Chacha20 for Multikey Channels | 357 |
Security Considerations of Modern Embedded Devices and Networking Equipment | 373 |
Selfadaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks | 385 |
QoS and EnergyAware Services Management of Resources in a Cloud Computing Environment | 402 |
Maximum Lifetime of the Wireless Sensor Network and the Gossip Problem | 414 |
Wireless Network with Bluetooth Low Energy Beacons for Vehicle Detection and Classification | 429 |
445 | |
Other editions - View all
Common terms and phrases
additional algorithm allows analysis anonymity application approach arrival assumed attack authentication average bits buffer calculated calls channel clients communication Conference congestion connection considered cycle defined delay depends described detection determine developed devices distribution energy environment equal evaluation example execution experiments flow frequency function given IEEE implementation increase International introduced limited load loss means measure mechanism messages method mode monitoring node observed obtained operation optimal packet parameters path performance Poland possible presented probability problem proposed protocol provides queue receiver requires response router scenario scheduler selected server shown signal simulation single solution Springer step stream structure switch Table technique Technology throughput tion traffic transmission transmitted trees University wireless