We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Networking and Telecommunications
Network architecturesNetwork design principles Layering Naming and addressing Programming interfaces
Network protocolsNetwork protocol design Protocol correctness Protocol testing and verification Formal specifications Link-layer protocols Network layer protocols Routing protocols Signaling protocols Transport protocols Session protocols Presentation protocols Application layer protocols Peer-to-peer protocols OAM protocols Time synchronization protocols Network policy Cross-layer protocols Network File System (NFS) protocol
Network componentsIntermediate nodes Routers Bridges and switches Physical links Repeaters Middle boxes / network appliances End nodes Network adapters Network servers Wireless access points, base stations and infrastructure Cognitive radios Logical nodes Network domains
Network algorithmsData path algorithms Packet classification Deep packet inspection Packet scheduling Control path algorithms Network resources allocation Network control algorithms Traffic engineering algorithms Network design and planning algorithms Network economics
Network performance evaluationNetwork performance modeling Network simulations Network experimentation Network performance analysis Network measurement
Network propertiesNetwork security Security protocols Web protocol security Mobile and wireless security Denial-of-service attacks Firewalls Network range Short-range networks Local area networks Metropolitan area networks Wide area networks Very long-range networks Network structure Topology analysis and generation Physical topologies Logical / virtual topologies Network topology types Point-to-point networks Bus networks Star networks Ring networks Token ring networks Fiber distributed data interface (FDDI) Mesh networks Wireless mesh networks Hybrid networks Network dynamics Network reliability Error detection and error correction Network mobility Network manageability Network privacy and anonymity
Network servicesNaming and addressing Cloud computing Location based services Programmable networks In-network processing Network management Network monitoring
Network typesNetwork on chip Home networks Storage area networks Data center networks Wired access networks Cyber-physical networks Sensor networks Mobile networks Overlay and other logical network structures Peer-to-peer networks World Wide Web (network structure) Social media networks Online social networks Wireless access networks Wireless local area networks Wireless personal area networks Ad hoc networks Mobile ad hoc networks Public Internet Packet-switching networks