{"id":1518,"date":"2023-09-27T17:41:42","date_gmt":"2023-09-27T12:41:42","guid":{"rendered":"https:\/\/afzalbadshah.com\/?page_id=1518"},"modified":"2025-09-15T08:41:30","modified_gmt":"2025-09-15T03:41:30","slug":"computer-networks","status":"publish","type":"page","link":"https:\/\/afzalbadshah.com\/index.php\/computer-networks\/","title":{"rendered":"Computer Networks"},"content":{"rendered":"\n<p>This course takes a comprehensive approach to computer networks equipping you with both the theoretical foundations and practical skills needed to understand and build robust networks. <a href=\"https:\/\/drive.google.com\/drive\/folders\/1MaQz4Ku9kuAwUN7I__rBzSuoz4k44t_D?usp=drive_link\" target=\"_blank\" rel=\"noopener\" title=\"\">The study plan can also be downloaded here. <\/a><\/p>\n\n\n<div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-grid pt-cv-colsys\" id=\"pt-cv-view-ba92ab3bc1\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"2\"><div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/01\/introduction-to-computer-networks\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/1-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/01\/introduction-to-computer-networks\/\" class=\"_blank\" target=\"_blank\" >Introduction to Computer Networks<\/a><\/h4>\n<div class=\"pt-cv-content\">A computer network enables two or more computing devices to exchange data using hardware and software components. In ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/01\/introduction-to-computer-networks\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/02\/understanding-the-osi-model-a-comprehensive-guide-to-the-seven-layers-of-networking\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/09\/Understanding-the-OSI-Model-1.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/02\/understanding-the-osi-model-a-comprehensive-guide-to-the-seven-layers-of-networking\/\" class=\"_blank\" target=\"_blank\" >Understanding the OSI Model: A Comprehensive Guide<\/a><\/h4>\n<div class=\"pt-cv-content\">The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/02\/understanding-the-osi-model-a-comprehensive-guide-to-the-seven-layers-of-networking\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/02\/overview-of-data-communication\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-6.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-6.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-6.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-6.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-6.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-6.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/02\/overview-of-data-communication\/\" class=\"_blank\" target=\"_blank\" >Overview of Data\u00a0Communication<\/a><\/h4>\n<div class=\"pt-cv-content\">In our increasingly connected world, data communication plays a fundamental role in enabling the exchange of information and ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/02\/overview-of-data-communication\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/03\/ethernet-and-its-technology\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Ethernet-and-Its-Technology.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/03\/ethernet-and-its-technology\/\" class=\"_blank\" target=\"_blank\" >Ethernet and Its Technology<\/a><\/h4>\n<div class=\"pt-cv-content\">Ethernet is a widely used and standardized technology for wired local area networks (LANs) that facilitates the transmission ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/03\/ethernet-and-its-technology\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/03\/circuit-switching-and-packet-switching-in-computer-networks\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-3.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-3.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-3.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-3.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-3.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-3.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/03\/circuit-switching-and-packet-switching-in-computer-networks\/\" class=\"_blank\" target=\"_blank\" >Circuit Switching and Packet Switching in Computer Networks<\/a><\/h4>\n<div class=\"pt-cv-content\">Circuit switching and packet switching represent two distinct paradigms in data communication. Circuit switching creates a dedicated communication ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/03\/circuit-switching-and-packet-switching-in-computer-networks\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/dsl-digital-subscriber-line-cable-modem\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-4.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-4.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-4.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-4.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-4.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-4.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/dsl-digital-subscriber-line-cable-modem\/\" class=\"_blank\" target=\"_blank\" >Dialup Model, DSL (Digital Subscriber Line) &#038; Cable Modem<\/a><\/h4>\n<div class=\"pt-cv-content\">Digital Subscriber Line (DSL) is a broadband technology that revolutionized internet access by using traditional telephone lines, offering ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/dsl-digital-subscriber-line-cable-modem\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/multiple-access-techniques-channelization-in-data-communication\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/1-2-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/multiple-access-techniques-channelization-in-data-communication\/\" class=\"_blank\" target=\"_blank\" >Multiple Access Techniques (Channelization)  in Data Communication<\/a><\/h4>\n<div class=\"pt-cv-content\">In modern communication systems, multiple devices often need to share the same communication channel. This is where Multiple ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/multiple-access-techniques-channelization-in-data-communication\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/overview-of-wireless-lans\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?fit=300%2C300&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"Cloud network system png sticker\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?w=1300&amp;ssl=1 1300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/12\/cHJpdmF0ZS9sci9pbWFnZXMvd2Vic2l0ZS8yMDIyLTA2L2pvYjk0OC0yMjQtcF8xLnBuZw.png?resize=270%2C270&amp;ssl=1 270w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/overview-of-wireless-lans\/\" class=\"_blank\" target=\"_blank\" >Overview of Wireless LANs<\/a><\/h4>\n<div class=\"pt-cv-content\">Wireless Local Area Networks (WLANs) allow devices to communicate and share data using radio waves instead of physical ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/overview-of-wireless-lans\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/error-detection-and-correction-in-data-communication\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-12.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-12.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-12.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-12.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-12.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-12.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/error-detection-and-correction-in-data-communication\/\" class=\"_blank\" target=\"_blank\" >Error Detection and Correction in Data Communication<\/a><\/h4>\n<div class=\"pt-cv-content\">Before going toward error detection and correction, let bit explore the byte stuffing which accrues in packet transmission ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/01\/04\/error-detection-and-correction-in-data-communication\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/10\/23\/basics-of-internet-protocol-ip\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Week-04-IP-Addressing.pptx-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/10\/23\/basics-of-internet-protocol-ip\/\" class=\"_blank\" target=\"_blank\" >Basics of Internet Protocol (IP) AND IP Addressing<\/a><\/h4>\n<div class=\"pt-cv-content\">The Internet Protocol (IP) is a fundamental set of rules and conventions that define how data is transmitted ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/10\/23\/basics-of-internet-protocol-ip\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/10\/23\/packets-frames-and-error-detection\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-10.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-10.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-10.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-10.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-10.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/10\/Slide1-10.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/10\/23\/packets-frames-and-error-detection\/\" class=\"_blank\" target=\"_blank\" >Packet and Frames in Computer Networks<\/a><\/h4>\n<div class=\"pt-cv-content\">Packets, frames, and error detection are fundamental concepts in computer networking and data communication. These terms are used ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/10\/23\/packets-frames-and-error-detection\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/11\/15\/cidr-classless-inter-domain-routing-and-vlsm-variable-length-subnet-masking\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/07-CIDR-and-VLSM.pptx-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/11\/15\/cidr-classless-inter-domain-routing-and-vlsm-variable-length-subnet-masking\/\" class=\"_blank\" target=\"_blank\" >CIDR (Classless Inter-Domain Routing) and VLSM (Variable Length Subnet Masking)<\/a><\/h4>\n<div class=\"pt-cv-content\">In the domain of networking, two pivotal concepts revolutionized the way we allocate and manage IP addresses: CIDR ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/11\/15\/cidr-classless-inter-domain-routing-and-vlsm-variable-length-subnet-masking\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/11\/24\/introduction-to-routing-in-computer-networks\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-5.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-5.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-5.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-5.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-5.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2023\/11\/Slide1-5.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/11\/24\/introduction-to-routing-in-computer-networks\/\" class=\"_blank\" target=\"_blank\" >Introduction to Routing in Computer Networks<\/a><\/h4>\n<div class=\"pt-cv-content\">Routing is an important function in computer networking that involves directing data packets from one device to another ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2023\/11\/24\/introduction-to-routing-in-computer-networks\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/03\/understanding-network-address-translation-nat\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/1-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/03\/understanding-network-address-translation-nat\/\" class=\"_blank\" target=\"_blank\" >Understanding Network Address Translation (NAT)<\/a><\/h4>\n<div class=\"pt-cv-content\">Network Address Translation (NAT) is a method used to map private IP addresses to a single public IP ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/03\/understanding-network-address-translation-nat\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/04\/introduction-to-dynamic-host-configuration-protocol-dhcp\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/DHCP.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/04\/introduction-to-dynamic-host-configuration-protocol-dhcp\/\" class=\"_blank\" target=\"_blank\" >Dynamic Host Configuration Protocol (DHCP)<\/a><\/h4>\n<div class=\"pt-cv-content\">Dynamic Host Configuration Protocol (DHCP) is a crucial network protocol designed to automatically assign IP addresses and other ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/04\/introduction-to-dynamic-host-configuration-protocol-dhcp\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/12\/advanced-routing-protocols-eigrp-and-bgp\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMTcwNzQyLWltYWdlLWt3dnk1d3ZqLmpwZw.jpg?fit=300%2C200&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"Free internet lan modem image\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMTcwNzQyLWltYWdlLWt3dnk1d3ZqLmpwZw.jpg?w=1300&amp;ssl=1 1300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMTcwNzQyLWltYWdlLWt3dnk1d3ZqLmpwZw.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMTcwNzQyLWltYWdlLWt3dnk1d3ZqLmpwZw.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMTcwNzQyLWltYWdlLWt3dnk1d3ZqLmpwZw.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMTcwNzQyLWltYWdlLWt3dnk1d3ZqLmpwZw.jpg?resize=405%2C270&amp;ssl=1 405w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/12\/advanced-routing-protocols-eigrp-and-bgp\/\" class=\"_blank\" target=\"_blank\" >Advanced Routing Protocols &#8211; EIGRP and BGP<\/a><\/h4>\n<div class=\"pt-cv-content\">Routing protocols play a crucial role in directing network traffic efficiently. Two advanced routing protocols widely used in ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/12\/advanced-routing-protocols-eigrp-and-bgp\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/12\/distance-vector-and-state-link-routing-protocols\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMDg5NTEyLWltYWdlLWt3dnkzcXdyLmpwZw.jpg?fit=300%2C200&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"Netwrok router\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMDg5NTEyLWltYWdlLWt3dnkzcXdyLmpwZw.jpg?w=1300&amp;ssl=1 1300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMDg5NTEyLWltYWdlLWt3dnkzcXdyLmpwZw.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMDg5NTEyLWltYWdlLWt3dnkzcXdyLmpwZw.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMDg5NTEyLWltYWdlLWt3dnkzcXdyLmpwZw.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/czNmcy1wcml2YXRlL3Jhd3BpeGVsX2ltYWdlcy93ZWJzaXRlX2NvbnRlbnQvbHIvcHgxMDg5NTEyLWltYWdlLWt3dnkzcXdyLmpwZw.jpg?resize=405%2C270&amp;ssl=1 405w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/12\/distance-vector-and-state-link-routing-protocols\/\" class=\"_blank\" target=\"_blank\" >Distance Vector and State Link Routing Protocols<\/a><\/h4>\n<div class=\"pt-cv-content\">Routing protocols are fundamental to network communication, and two prominent categories are Distance Vector and State Link protocols ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/12\/distance-vector-and-state-link-routing-protocols\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/24\/understanding-ipv6-addressing\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?fit=300%2C200&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"person using black and white smartphone and holding blue card\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?w=1880&amp;ssl=1 1880w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?resize=405%2C270&amp;ssl=1 405w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/01\/pexels-photo-230544.jpeg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/24\/understanding-ipv6-addressing\/\" class=\"_blank\" target=\"_blank\" >Understanding IPv6 Addressing<\/a><\/h4>\n<div class=\"pt-cv-content\">IPv6, or Internet Protocol version 6, is the most recent version of the Internet Protocol, which serves as ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/01\/24\/understanding-ipv6-addressing\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/10\/10\/introduction-to-icmp-protocol\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/10\/Introduction-to-ICMP-Protocol-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/10\/10\/introduction-to-icmp-protocol\/\" class=\"_blank\" target=\"_blank\" >Introduction to ICMP Protocol<\/a><\/h4>\n<div class=\"pt-cv-content\">The Internet Control Message Protocol (ICMP) is an integral part of the Internet Protocol (IP) suite, which plays ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/10\/10\/introduction-to-icmp-protocol\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/11\/18\/introduction-to-routing-protocols-ospf-eigrp-and-rip\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/11\/Introduction-to-Routing-Protocols-RIP-OSPF-EIGRP-jpg.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/11\/18\/introduction-to-routing-protocols-ospf-eigrp-and-rip\/\" class=\"_blank\" target=\"_blank\" >Introduction to Routing Protocols: OSPF, EIGRP, and RIP<\/a><\/h4>\n<div class=\"pt-cv-content\">Routing protocols are critical in determining the best paths for data transmission across networks. These protocols are primarily ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/11\/18\/introduction-to-routing-protocols-ospf-eigrp-and-rip\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/12\/01\/flow-control-in-computer-networks\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/1.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/12\/01\/flow-control-in-computer-networks\/\" class=\"_blank\" target=\"_blank\" >Flow Control in Computer Networks<\/a><\/h4>\n<div class=\"pt-cv-content\">Flow control in computer networks ensures efficient communication by managing the data transmission rate between the sender and ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/12\/01\/flow-control-in-computer-networks\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/12\/18\/understanding-network-ports-a-beginners-guide-to-networking-essentials\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2024\/12\/Flow-Control-in-Computer-Networks.webp?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/12\/18\/understanding-network-ports-a-beginners-guide-to-networking-essentials\/\" class=\"_blank\" target=\"_blank\" >Understanding Ports and Sockets in Computer Networks<\/a><\/h4>\n<div class=\"pt-cv-content\">In computer networks, communication is not just about moving data between devices. It is about making sure the ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2024\/12\/18\/understanding-network-ports-a-beginners-guide-to-networking-essentials\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2025\/11\/06\/understanding-routing-in-computer-networks-from-basics-to-advanced-protocols\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/11\/Routing.pptx-2.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2025\/11\/06\/understanding-routing-in-computer-networks-from-basics-to-advanced-protocols\/\" class=\"_blank\" target=\"_blank\" >Understanding Routing in Computer Networks: From Basics to Advanced Protocols<\/a><\/h4>\n<div class=\"pt-cv-content\">Think about how you use Google Maps or a delivery app every day. When you request directions, it ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2025\/11\/06\/understanding-routing-in-computer-networks-from-basics-to-advanced-protocols\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-6 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/afzalbadshah.com\/index.php\/2025\/12\/03\/understanding-application-layer-protocols\/\" class=\"_blank pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_blank\" ><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?fit=300%2C169&amp;ssl=1\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?resize=480%2C270&amp;ssl=1 480w, https:\/\/i0.wp.com\/afzalbadshah.com\/wp-content\/uploads\/2025\/12\/Basics-of-IP-and-Addressing.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2025\/12\/03\/understanding-application-layer-protocols\/\" class=\"_blank\" target=\"_blank\" >Understanding Application Layer Protocols<\/a><\/h4>\n<div class=\"pt-cv-content\">The Application Layer sits at the very top of network architecture and provides the interface between human-facing applications ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/afzalbadshah.com\/index.php\/2025\/12\/03\/understanding-application-layer-protocols\/\" class=\"_blank pt-cv-readmore btn btn-success\" target=\"_blank\">Read More<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course takes a comprehensive approach to computer networks equipping you with both the theoretical foundations and practical skills needed to understand and build robust networks. The study plan can also be downloaded here.<\/p>\n","protected":false},"author":1,"featured_media":3281,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-1518","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/Pf3emP-ou","jetpack-related-posts":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/pages\/1518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/comments?post=1518"}],"version-history":[{"count":5,"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/pages\/1518\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/pages\/1518\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/media\/3281"}],"wp:attachment":[{"href":"https:\/\/afzalbadshah.com\/index.php\/wp-json\/wp\/v2\/media?parent=1518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}