Computer Networks 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25-27, 2019, Proceedings
This book constitutes the thoroughly refereed proceedings of the 26th International Conference on Computer Networks, CN 2019, held in Gliwice, Poland, in June 2019.The 29 full papers presented were carefully reviewed and selected from 64 submissions. They are organized in topical sections on compute...
Saved in:
Main Authors | , , |
---|---|
Format | eBook Conference Proceeding |
Language | English |
Published |
Cham
Springer Nature
2019
Springer International Publishing AG Springer International Publishing Springer |
Edition | 1 |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Table of Contents:
- Intro -- Preface -- Organization -- Contents -- Computer Networks -- Performance Modeling of the Consensus Mechanism in a Permissioned Blockchain -- 1 Introduction -- 2 Fundamental Properties of a Blockchain -- 3 Performance Analysis of the Consensus Mechanism -- 3.1 A Fork-Join Queueing Model of the Consensus Protocol -- 3.2 Analysis of the Fork-Join Model of a Vote-Based Consensus Protocol -- 3.3 Performance Evaluation of an Illustrative P2P Network -- 4 Conclusions -- References -- An Architectural Framework Proposal for IoT Driven Agriculture -- 1 Introduction -- 2 Review of Related Literature -- 3 Assessment of the Agricultural Challenges in Africa -- 4 Key Challenges to the Adoption of IoT Driven Agriculture -- 5 The Proposed Architectural Framework -- 5.1 The IoT Layer -- 5.2 The Fog Layer -- 5.3 The Cloud Layer -- 6 Conclusions and Future Research Works -- References -- The Procedure of Key Distribution in Military IoT Networks -- 1 Introduction -- 2 The Basic Definitions -- 3 The Procedure of Key Distribution -- 4 The Simulation Setup and Results of Energy Consumption Analysis -- 5 Conclusions and Future Work -- References -- Modeling of Computer Networks Using SAP HANA Smart Data Streaming -- 1 Introduction -- 2 Classic Fluid-Flow Approximation Model -- 3 Implementation of Classical Model Using Streaming Engine -- 4 Model Extension with Automatic Modification of Parameters of Network Nodes -- 5 Numerical Example -- 6 Conclusions -- References -- An Impact of Jamming Signal on the Energy Efficiency of ZigBee Network Elements -- 1 Introduction -- 2 Test Stand for Measurement the Influence of Jamming Signal -- 3 Results of the Measurements -- 4 Energy Saving Model in Jamming Conditions -- 5 Conclusions and Future Work -- References -- Quantum Switch Realization by the Quantum Lyapunov Control -- 1 Introduction -- 2 Preliminaries
- 4.2 Architecture of the BotGRABBER System -- 5 Experiments -- 5.1 Evaluation Setting -- 5.2 Performance Measures of the BotGRABBER System -- 5.3 Research of the SVM-Based Inference Engine Efficiency for Making the Decision About the Presence of the Cyberattacks -- 5.4 Results -- 6 Discussion -- 7 Conclusions -- References -- Cyber Attack Detection by Using Neural Network Approaches: Shallow Neural Network, Deep Neural Network and AutoEncoder -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Dataset -- 3.2 Shallow Neural Network (SNN) and Deep Neural Network (DNN) -- 3.3 AutoEncoder (AE) -- 4 Proposed Models and Test Results -- 5 Conclusion -- References -- Temporal Characteristics of CodeSys Programmed Raspberry Pi and Beaglebone Black Embedded Devices -- 1 Introduction -- 2 Testbed -- 3 Results -- 3.1 Cyclic Program Execution Without Communication Tasks -- 3.2 Freewheeling Program Execution Without Communication Tasks -- 3.3 Cyclic Program Execution with Modbus TCP Communication -- 3.4 Cyclic Program Execution with EtherCAT Communication -- 4 Final Remarks and Future Works -- References -- Ateb-Modeling Method Application for High Quality Video Traffic Modeling -- 1 Introduction -- 2 Proposed Solution -- 3 Video Traffic Analysis -- 4 Simulation Procedure -- 5 Description of Conducted Experiments -- 6 Modeling Results -- 7 Conclusions -- References -- A Comparison of Request Distribution Strategies Used in One and Two Layer Architectures of Web Cloud Systems -- 1 Introduction -- 2 Related Work -- 3 Two and One Layer Architectures of Cloud Web Systems -- 3.1 Request Distribution Strategies -- 3.2 Intelligent Neuro-Fuzzy Broker -- 4 Experiments and Results -- 5 Summary -- References -- Communications -- Mobile Voice Traffic Load Characteristics -- 1 Introduction -- 2 Related Work -- 3 Data Acquisition and Processing -- 4 Call Flow Process
- 3.2 The Sensing Matrix -- 4 Estimation Errors -- 4.1 The Discrete Channel -- 4.2 The Reconstruction Error -- 4.3 Summary -- 5 Numerical Simulation -- 5.1 The Algorithm -- 5.2 Simulation Parameters -- 5.3 The Results -- 6 Conclusion -- References -- Recreation of Containers for High Availability Architecture and Container-Based Applications -- 1 Introduction -- 2 Characteristics of the Container Environment -- 3 Related Works -- 4 Case Study -- 5 Experiments -- 6 Improvement of Container Resilience -- 7 Proposal of Suitable Architecture Patterns and Prototype Solution -- 8 Conclusions and Further Work -- References -- Queueing Theory and Queuing Networks -- Analysis of Energy Consumption in Cloud Center with Tasks Migrations -- 1 Introduction -- 2 Energy Consumption Model -- 3 Jackson Network Model for Task Migrations -- 3.1 Analytic Results for the Queues -- 3.2 Comparing Both Systems -- 3.3 Optimization of Energy Consumption -- 4 Numerical Results -- 5 Conclusion -- References -- Queueing Systems with Non-homogeneous Customers and Infinite Sectorized Memory Space -- 1 Introduction -- 2 Basic Notations and Mathematical Background -- 3 System M/G/n/0 Analysis -- 4 Conclusions and Final Remarks -- References -- Transient Solution of a Heterogeneous Queuing System with Balking and Retention of Reneging Customers -- 1 Introduction -- 2 System Model -- 3 Time-Dependent Behavior of the Model -- 4 Numerical Example -- 4.1 Stability Analysis -- 4.2 Comparative Analysis of Two Queuing Models with and Without Heterogeneous Servers -- 5 Stationary Probabilities -- 5.1 Stationary Characteristics -- 6 Particular Cases -- 7 Conclusions -- References -- Cluster-Based Web System Models for Different Classes of Clients in QPN -- 1 Introduction -- 2 Related Works -- 3 Cluster-Based Web System Architecture -- 4 Formal Model
- 4.1 Combination of Queueing Nets and Petri Nets
- 2.1 Quantum Switch -- 2.2 Quantum Lyapunov Control -- 3 Quantum Switch Implementation by the Quantum Lyapunov Control -- 3.1 Numerical Examples -- 4 Conclusions -- References -- Simulation Analysis of Packet Delivery Probability in LoRa Networks -- 1 Introduction and Motivation -- 2 Literature Review -- 3 Model Description -- 3.1 Packet Collisions in LoRa -- 3.2 Discrete Event Simulation Model -- 3.3 Validation of the Model -- 4 Results -- 4.1 Random Topology -- 4.2 Smart City Topologies -- 4.3 Spatial Distribution of Collision Probability -- 5 Conclusions -- References -- Comparative Study Between Reactive and Proactive Protocols of (MANET) in Terms of Power Consumption and Quality of Service -- 1 Introduction -- 2 MANET Routing Protocols Categories -- 2.1 Reactive Routing Protocols -- 2.2 Proactive Routing Protocols -- 3 Simulation Methodology -- 3.1 Simulation Parameters -- 3.2 Power Consumption Metrics -- 3.3 Quality of Service Metrics in MANET -- 4 Performance Analysis and Simulation Results -- 4.1 Power Consumption -- 4.2 Quality of Service Measurement Performance -- 5 Conclusion -- References -- Extending Lifetime of Wireless Sensor Network in Application to Road Traffic Monitoring -- 1 Introduction -- 2 Related Works -- 3 Wireless Sensor Network for Road Traffic Monitoring -- 4 Methods for Extending Network Lifetime -- 5 Experiments -- 6 Conculsions -- References -- BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks -- 1 Introduction -- 2 Related Work -- 2.1 Botnet Detection Approaches -- 2.2 Self-Adaptive System for the Corporate Area Networks Resilience in the Presence of Botnet Cyberattacks -- 3 Support Vector Machine -- 4 BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnet Cyberattacks -- 4.1 The Key Features of BotGRABBER
- 5 Theoretical Approach -- 6 Results -- 7 Conclusion -- References -- Vehicle in Motion Weighing Based on Vibration Data Collected from Sensor Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experiments -- 5 Conclusion -- References -- Optimal Spectrum Sharing in RF Energy Harvesting Cognitive Femtocell Networks -- 1 Introduction -- 2 System Model -- 3 Model of Cognitive Femtocell with RF Energy Harvesting -- 4 Spectrum Sharing Problem -- 4.1 Optimal Spectrum Sharing in Cognitive Femtocell Network with RF Energy Harvesting -- 5 Heuristic Algorithm for Power Allocation Ib Cognitive Femtocell Network with RF Energy Harvesting -- 6 Simulation Results -- 7 Conclusion -- References -- Accuracy of UWB Location Tracking Devices When on the Move -- 1 Introduction and Motivation -- 2 Testbed Description -- 2.1 Stationary Measurements -- 2.2 Mobile Measurements -- 3 Results of Stationary Measurements -- 4 Accuracy of UWB Location for Moving Objects -- 5 Conclusions -- References -- Cells Interrelation in Mobile Networks -- 1 Introduction -- 2 Related Works -- 3 Cell Graphical Representation -- 4 Relative Position Scenarios -- 5 Conclusions -- References -- Communication Model of Smart Substation for Cyber-Detection Systems -- 1 Introduction -- 2 Related Works -- 3 Analysis of Communication Protocols in ICS -- 4 Established Smart Substation Model -- 5 Cyberphysical Environment for Smart Substation with IEC 61850 Protocol -- 5.1 IEC 61850 in ISO/OSI Context -- 5.2 IEC 61850 Communication and Data Model Design -- 5.3 Experimental Environment and Results -- 6 Functionality and Model Comparison -- 7 Conclusion -- References -- Virtual Oversampling of Sparse Channel Impulse Response -- 1 Introduction -- 2 Problem Statement -- 2.1 FIR Filter Design -- 2.2 Compressive Sensing -- 3 Filtered Impulse Response of the Channel -- 3.1 The Shaping Filter