{"id":3703,"date":"2024-02-28T12:48:58","date_gmt":"2024-02-28T07:18:58","guid":{"rendered":"https:\/\/journal.ipem.edu.in\/computer_applications\/?page_id=3703"},"modified":"2024-03-30T15:01:46","modified_gmt":"2024-03-30T09:31:46","slug":"computer-networking-acquiring-global-world","status":"publish","type":"page","link":"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/","title":{"rendered":"Computer Networking Acquiring Global World"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3703\" class=\"elementor elementor-3703\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3b3d6bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b3d6bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d724340\" data-id=\"d724340\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c722ad7 elementor-widget elementor-widget-heading\" data-id=\"c722ad7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Computer Networking Acquiring Global World<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12c9a41 elementor-widget elementor-widget-html\" data-id=\"12c9a41\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#author\"> <em> Shweta Chaudhary  <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#author\"> <em> Ajay Kumar  <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#author\"> <em> Abhinav Tyagi  <\/em><\/a>\r\n\r\n\r\n\r\n\r\n\r\n                                        <p class=\"Issue\"><a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/\">Vol 8 ,  Issue 1 , December 2023<\/a><span class=\"pipe\"> | <\/span>Pages: 52-55\r\n                                        <\/p>\r\n                                        \r\n                <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/\">10.61691\/IPEM_CA.8.2023.52-55<\/a><\/p>\r\n\r\n                                        <p class=\"Published\"><span class=\"articledate\">Published Online: December, 2023<\/span><\/p>\r\n                                <p class=\"Download\">        <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_9.pdf\" target=\"_blank\">Download Article<\/a><\/p>\r\n                    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb397b elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"1eb397b\" data-element_type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-1eb397b\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"1eb397b\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"author\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"author-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Author Affiliations<\/span>                                                    <\/li>\n                                            <li id=\"abstract\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"abstract-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Abstract<\/span>                                                    <\/li>\n                                            <li id=\"references\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"references-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >References<\/span>                                                    <\/li>\n                                            <li id=\"citation\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"citation-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Citation<\/span>                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"author-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"author-tab\">\n\t\t\t\t        <p class=\"Author-bg\"><b>Author Details<\/b><\/p>\n\n<div class=\"card-body table-responsive\">\n<div class=\"autinfo\"><b class=\"sn\">1. <\/b>Shweta Chaudhary, <em>IPEM College, Gzb <\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">2. <\/b>Ajay Kumar , <em>Kamkush College of Law<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">3. <\/b>Abhinav Tyagi, <em>IPEM College, Gzb <\/em><\/div>\n<\/div>                    <\/div>\n\t\t        \n                    <div id=\"abstract-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"abstract-tab\">\n\t\t\t\t        <p style=\"text-align: justify;\">Computer networks are a system of interconnected computers for the purpose of sharing digital information. The concept of a network began in 1962 when a server at the Massachusetts Institute of Technology was connected to aserver in Santa Monica, California. Since that time the proliferation of computers and computer networks has increased significantly. One of the most significant challenges to networks is attacks on their resources caused byinadequate network security. In this research paper we highlight and overview concept of computer networks.<\/p>\n<p class=\"keywords\">Keywords<\/p>\nComputer networks, protocols, network security.                    <\/div>\n\t\t        \n                    <div id=\"references-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"references-tab\">\n\t\t\t\t        <ol><li>http:\/\/en.wikipedia.org\/wiki\/Computer_network<\/li><li>http:\/\/gimnetwork.wordpress.com\/2013\/01\/19\/properties-of-computer-networks\/<\/li><li>http:\/\/www.goldgroup.co.uk\/brief-history-networking\/<\/li><li>http:\/\/www.edrawsoft.com\/Network-Protocol.php<\/li><li>http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=6157406&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2 Fiel5%2F5449605%2F6157403%2F06157406.pdf%3Farnumber%3D6157406<\/li><li>http:\/\/infpower.wordpress.com\/<\/li><li>http:\/\/www.ecii.edu\/wpcontent\/uploads\/2013\/10\/Tantillo_1_Pantani_Network_Security_Through_Open_Source_ Intrusion_Detection_Systems_May2012.pdf<\/li><\/ol>                    <\/div>\n\t\t        \n                    <div id=\"citation-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"citation-tab\">\n\t\t\t\t        <p>Chaudhary, et.al (2003); <strong>Computer Networking Acquiring Global World, <\/strong>IPEM JOURNAL OF COMPUTER APPLICATION &amp; RESEARCH, 8(1), 52-55<\/p>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Computer Networking Acquiring Global World Shweta Chaudhary , Ajay Kumar , Abhinav Tyagi Vol 8 , Issue 1 , December [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3703","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/comments?post=3703"}],"version-history":[{"count":13,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3703\/revisions"}],"predecessor-version":[{"id":3943,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3703\/revisions\/3943"}],"wp:attachment":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/media?parent=3703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}