Networks make it easy to establish ad hoc collaborating communities of people and computing devices. They configure and reconfigure themselves automatically, as nodes appear, migrate, and disappear. This makes them easier to maintain than before, when networks were tuned largely for static wired topologies. Local networks connect seamlessly with each other, with satellite and terrestrial networks, and with a large number and variety of physical devices that can be used to monitor and control the physical world.
The demand for network technologies and communications is large and growing rapidly. Networking should be on-demand, with whomever or whatever they want, regardless of time or location. To meet these requirements, industry has invested heavily in a variety of wireless and wireline communications technologies, each with its own strengths and weaknesses. In recent times, we have seen the emergence of 3G and 4G, WiFi and WiMax, Bluetooth and Zigbee, Ultrawideband and TV-band, Powerline and Free space optical.
Next-generation services require unified and scalable technologies spread across the network protocol layers facilitating a converged service model across all partitions of the network.
Networks allow the user to access remote programs and remote databases either of the same organization or from other enterprises or public sources. Networks Technology provides communication possibilities faster than other facilities. Because of these optimal information and communication possibilities, networks may increase the organizational learning rate, which many authors declare as the only fundamental advantage in competition.
Because of the importance of this technology, decisions of purchase, structure, and operation of networks, management has a critical need for understanding the technology of networks and communications.
Special Track: Information Technology Security
With computer hackers becoming increasingly sophisticated and the number of emerging threats rising, it is important to equip ourselves with the right preventive measures. IT security problems arise not only from external sources, but also from careless behavior. This can be easily solved by providing relevant training and ongoing awareness communications and activities for employees and students.
As the need for IT security expands, so will the influx of security programs. Therefore, it is crucial to be well informed and educated with the right information to cater to your respective needs. The IT security conference will discuss a range of topics from various preventive methods and finding the right one for your business.
The conference program offers insightful plenary and keynote addresses, stimulating technical sessions, seminars and panel discussions, poster sessions and multiple social and networking opportunities.
- The Conference Proceedings (Print ISSN: 2251-2233, E-Periodical ISSN: 2251-2241) will beindexed by EBSCO, CrossRef, Proquest and will be submitted to Scopus, ScienceDirect and amongst others, where applicable.
- Depending on their importance, originality, quality, relevance and other editorial considerations, eligible research articles will be invited for publication in the GSTF International Journal on Computing (JoC). (ISSN: 2010-2283) which is indexed by EBSCO, CrossRef, Proquest and Cabell's Directory.
- Best Paper Awards and Best Student Paper Awards will be conferred at the conference (in order to qualify for the award, the paper must be presented at the conference).