Conferences related to Protocols

Back to Top

2021 IEEE Photovoltaic Specialists Conference (PVSC)

Photovoltaic materials, devices, systems and related science and technology


ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.



Periodicals related to Protocols

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)



Most published Xplore authors for Protocols

Back to Top

Xplore Articles related to Protocols

Back to Top

Modern computer networks and distributed intelligence in accelerator controls

Conference Record of the 1991 IEEE Particle Accelerator Conference, 1991

Appropriate hardware and software network protocols are surveyed for accelerator control environments. Accelerator control network topologies are discussed with respect to the following criteria: vertical versus horizontal and distributed versus centralized. Decision-making considerations are provided for accelerator network architecture specifications. Current trends and implementations at Fermilab are discussed.<<ETX>>


Prolog to internet multicast routing and transport control protocols

Proceedings of the IEEE, 2002

None


The IETF activities in the operations and management area

IEEE Communications Magazine, 2001

The Internet Engineering Task Force works on standardization of Internet related protocols. The work is divided into various areas. One of the areas is operations and management. This article provides first a summary of the areas that exist within the IETF and then describes in some detail the tasks for each of the Working Groups (WGs) in the operations and ...


MixCast: a new group communication model in large-scale network

19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), 2005

The traditional multicast model has some problems, such as access control, address allocation and protocol extensibility. To solve these problems, we provide a new group communication model named MixCast, which is suitable for large-scale heterogeneous networks. MixCast uses unicast between different access networks and use multicast in the same access network; at the same time, MixCast uses IEEE 802.1X protocol ...


Multicasting: Empowering the next-generation internet

IEEE Network, 2000

None



Educational Resources on Protocols

Back to Top

IEEE-USA E-Books

  • Modern computer networks and distributed intelligence in accelerator controls

    Appropriate hardware and software network protocols are surveyed for accelerator control environments. Accelerator control network topologies are discussed with respect to the following criteria: vertical versus horizontal and distributed versus centralized. Decision-making considerations are provided for accelerator network architecture specifications. Current trends and implementations at Fermilab are discussed.<<ETX>>

  • Prolog to internet multicast routing and transport control protocols

    None

  • The IETF activities in the operations and management area

    The Internet Engineering Task Force works on standardization of Internet related protocols. The work is divided into various areas. One of the areas is operations and management. This article provides first a summary of the areas that exist within the IETF and then describes in some detail the tasks for each of the Working Groups (WGs) in the operations and management area.

  • MixCast: a new group communication model in large-scale network

    The traditional multicast model has some problems, such as access control, address allocation and protocol extensibility. To solve these problems, we provide a new group communication model named MixCast, which is suitable for large-scale heterogeneous networks. MixCast uses unicast between different access networks and use multicast in the same access network; at the same time, MixCast uses IEEE 802.1X protocol to provide user access control and billing scheme for carriers. We also analyze the cost of MixCast communication in the network equipments.

  • Multicasting: Empowering the next-generation internet

    None

  • Ad hoc wireless networks: protocols and applications

    None

  • Internet multicast routing and transport control protocols

    Multicasting is a mechanism to send data to multiple receivers in an efficient way. We give a comprehensive survey on network and transport layer issues of Internet multicast. We begin with an introduction to the current Internet protocol multicast model-the "host group" model and the current Internet multicast architecture, then discuss in depth the following three research areas: (1) scalable multicast routing; (2) reliable multicast; and (3) multicast flow and congestion control. Our goal is to summarize the state of the art in Internet multicast and to stimulate further research in this area.

  • The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together

    The Host Identity Protocol (HIP) is an experimental architecture and protocol, being developed at the IETF since 1999 and reaching its first stable version in 2007. It enhances the original Internet architecture by injecting a new thin layer between the IP layer and the transport protocols. This new layer introduces a new name space consisting of cryptographic identifiers, thereby implementing the so-called identifier / locator split. In the new architecture, the new identifiers are used for naming application level end- points, thereby taking the prior identification role of IP addresses in applications, sockets, TCP connections, and UDP send and receive system calls. IPv4 and IPv6 addresses are still used, but only as names for topological locations in the network. At the same time, due to the backwards compatibility mode, no changes are needed in applications. The architectural enhancement implemented by HIP has profound consequences. A number of the previously hard problems become suddenly much easier. Mobility, multi-homing, and baseline end-to-end security integrate neatly into the architecture. The use of cryptographic identifiers allows enhanced accountability, thereby providing a base for easier build up of trust. With some privacy enhancements, HIP allows good location anonymity, assuring strong identity only towards relevant trusted parties. Finally, the HIP protocol has been carefully designed to take middle boxes into account, providing for overlay networks and thereby helping to reduce the currently prevalent problems with bad traffic and routing scalability. This tutorial provides an in-depth look at HIP, discussing its architecture, design, benefits, and potential drawbacks. In the first part of the tutorial, the architecture and design of HIP is discussed in an interactive but lecture-like manner. In the second part of the tutorial the protocol will be demonstrated in practise. The audience is assumed to have good knowledge about the current Internet architecture and the structure of the TCP/IP stack. However, no knowledge of HIP or the related problems are assumed.

  • Multicast Handover Agents for Fast Handover in Wireless Multicast Networks

    This Letter addresses the fast handover in wireless multicast networks. The existing multicast handover scheme tends to induce unnecessary data transmissions and large handover delay during handover. We propose a Multicast Handover Agent (MHA), which is used to support fast handover and to reduce unnecessary data transmission. In the proposed scheme, each MHA has a cache to maintain a list of active mobile nodes per multicast group, which is used to support the fast leave. The MHA also performs the fast join with its neighboring MHA during handover. By numerical analysis, it is shown that the proposed MHA scheme can give smaller handover delays compared to the existing multicast handover scheme.

  • NAT traversal for SIP-based presence services with symmetric dialog routing

    SIP (session initiation protocol) uses UDP and TCP as a transport protocol as well as SCTP, TLS. In the case of using UDP as a transport protocol, it is required to guarantee symmetric response routing for NAT or FW traversal. By the way, in the case of RFC3265-based presence services using SIP, there is some situation that requires symmetric dialog request/response routing for NAT. In this paper, we describe the way of guaranteeing symmetric SIP message routing within same IP-dialog.



Standards related to Protocols

Back to Top

IEEE Application Guide for Distributed Digital Control and Monitoring for Power Plants


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks-- Virtual Bridged Local Area Networks Amendment 12: Forwarding and Queuing Enhancements for Time-Sensitive Streams