{"id":1355,"date":"2022-01-02T04:57:56","date_gmt":"2022-01-02T04:57:56","guid":{"rendered":"https:\/\/swatilathia.wordpress.com\/?page_id=1355"},"modified":"2024-10-15T06:38:12","modified_gmt":"2024-10-15T06:38:12","slug":"basic-computer-network-application-of-internet","status":"publish","type":"page","link":"https:\/\/swatilathia.com\/?page_id=1355","title":{"rendered":"Basic : Computer Network &#038; Application of Internet"},"content":{"rendered":"<body>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69dd85dabc0e9\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69dd85dabc0e9\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Computer_Network\" >Computer Network<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Types_of_Computer_Network\" >Types of Computer Network<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#LAN_Local_Area_Network\" >LAN : Local Area Network<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#MAN_Metropolitan_Area_Network\" >MAN : Metropolitan Area Network<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#WAN_Wide_Area_Network\" >WAN : Wide Area Network<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#PAN_Personal_Area_Network\" >PAN : Personal Area Network<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Network_Topology\" >Network Topology<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Bus_Topology\" >Bus Topology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Ring_Topology\" >Ring Topology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Tree_Topology\" >Tree Topology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Star_Topology\" >Star Topology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Mesh_Topology\" >Mesh Topology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Hybrid_Topology\" >Hybrid Topology<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#OSI_Reference_Model\" >OSI Reference Model<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#TCPIP\" >TCP\/IP<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#TCP_Transmission_Control_Protocol\" >TCP :  Transmission Control Protocol<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#IP_Internet_Protocol\" >IP: Internet Protocol<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#ISP_%E2%80%93_Internet_Service_Provider\" >ISP \u2013 Internet Service Provider<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Intranet\" >Intranet<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#VSAT_%E2%80%93_Very_Small_Aperture_Terminal\" >VSAT \u2013 Very Small Aperture Terminal<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#DNS_%E2%80%93_Domain_Name_Server\" >DNS \u2013 Domain Name Server<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#WWW_%E2%80%93_World_Wide_Web\" >WWW \u2013 World Wide Web<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Search_Engine\" >Search Engine<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Remote_Login\" >Remote Login<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#E-mail_%E2%80%93_Electronic_Mail\" >E-mail \u2013 Electronic Mail<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#E-Commerce\" >E-Commerce<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#E-Business\" >E-Business<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#E-Governance\" >E-Governance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Mobile_Commerce\" >Mobile Commerce<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#HTTP_%E2%80%93_Hyper_Text_Transfer_Protocol\" >HTTP \u2013 Hyper Text Transfer Protocol<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#FTP_%E2%80%93_File_Transfer_Protocol\" >FTP \u2013 File Transfer Protocol<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#TELNET\" >TELNET<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Domain_Names\" >Domain Names<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#URL_%E2%80%93_Uniform_Resource_Locator\" >URL \u2013 Uniform Resource Locator<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Web_Page\" >Web Page<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Web_Site\" >Web Site<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Types_of_Website\" >Types of Website<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Web_Browser\" >Web Browser<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Web_Server\" >Web Server<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Web_Hosting\" >Web Hosting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Network_Security_Concept\" >Network Security Concept<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Firewall\" >Firewall :<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-43\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Cookies\" >Cookies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-44\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Hackers\" >Hackers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-45\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Crackers\" >Crackers<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-46\" href=\"https:\/\/swatilathia.com\/?page_id=1355\/#Types_of_Payment_System\" >Types of Payment System<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"computer-network\"><span class=\"ez-toc-section\" id=\"Computer_Network\"><\/span><strong>Computer Network<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>A computer network is a set of computers or their devices which are connected by links or communication channels to share &amp; communicate data or their resources. <\/li>\n\n\n\n<li>For example, when you are going to send any data\/information to another person by e-mail, this is done by internet which is basically a computer network.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-computer-network\"><span class=\"ez-toc-section\" id=\"Types_of_Computer_Network\"><\/span><strong>Types of Computer Network<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">A computer network can be categorized by their size. There are mainly four types of computer network. <strong><em>LAN, MAN, WAN, PAN<\/em><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"LAN_Local_Area_Network\"><\/span><strong>LAN : Local Area Network<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li class=\"has-medium-font-size\">It is a group of computers that connects with each other in a small area such as office, building. <\/li>\n\n\n\n<li>It is used to connect two or more personal computers through a communication medium such as coaxial cable, twisted pair cable etc. <\/li>\n\n\n\n<li>It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables. <\/li>\n\n\n\n<li>The data is transferred at an extremely faster rate in Local Area Network. <\/li>\n\n\n\n<li>Local Area Network provides higher security.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"MAN_Metropolitan_Area_Network\"><\/span><strong>MAN : Metropolitan Area Network<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It is a group of computer that connects a larger geographic area as compared to LAN such as a whole city or a large campus.<\/li>\n\n\n\n<li>Government agencies use MAN to connect to the citizens and private industries.<\/li>\n\n\n\n<li>In MAN, various LANs are connected to each other through a telephone exchange line.<\/li>\n\n\n\n<li>Cable TV network is another example of MAN.<\/li>\n\n\n\n<li>It has a higher range than Local Area Network(LAN).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"WAN_Wide_Area_Network\"><\/span><strong>WAN : Wide Area Network<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It is a network that extends over a large geographical area such as states or countries.<\/li>\n\n\n\n<li>It is quite bigger network than the MAN.<\/li>\n\n\n\n<li>It is not limited to a single location, but it spans over a large geographical area through a telephone line, fiber optic cable or satellite links.<\/li>\n\n\n\n<li>The internet is one of the biggest WAN in the world.<\/li>\n\n\n\n<li>It is widely used in the field of Business, government, and education.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"PAN_Personal_Area_Network\"><\/span><strong>PAN : Personal Area Network<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It is a network that connects electronic devices within a user\u2019s immediate area. <\/li>\n\n\n\n<li>The size of a PAN ranges from a few centimetres to a few meters. <\/li>\n\n\n\n<li>The most common examples of this network is the connection between a Bluetooth earphone and a smartphone. <\/li>\n\n\n\n<li>It can also connect laptops, tablets, printers, keyboards, and other computerized devices. <\/li>\n\n\n\n<li>It can either be wired or wireless. <\/li>\n\n\n\n<li>Wired connection methods include USB, etc.; wireless connection methods include Bluetooth, WiFi, etc.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"network-topology\"><span class=\"ez-toc-section\" id=\"Network_Topology\"><\/span><strong>Network Topology<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>A network topology defines how devices in a network are arranged to communicate with each other. It is an arrangement of elements\/devices in a network. Here we are discussing types of network topology : <strong><em>Bus Topology, Ring Topology, Tree Topology, Star Topology, Mesh Topology, Hybrid Topology<\/em><\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bus_Topology\"><\/span><strong>Bus Topology<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>In a bus topology, all the devices are arranged on a network along a single cable running in a single direction from one end of the network to the other. That\u2019s why it\u2019s called a \u201cline topology\u201d or \u201cbackbone topology.\u201d The configuration of a bus topology is quite simpler as compared to other topology.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"483\" height=\"196\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-4.png?resize=483%2C196&#038;ssl=1\" alt=\"\" class=\"wp-image-1577\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-4.png?w=483&amp;ssl=1 483w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-4.png?resize=300%2C122&amp;ssl=1 300w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/figure>\n\n\n\n<p id=\"advantages-of-bus-topology\"><strong>Advantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It is cost-effective choice for smaller networks because the layout is simple.<\/li>\n\n\n\n<li>It allows all devices to be connected via a single coaxial or RJ45 cable.<\/li>\n\n\n\n<li>If needed, more nodes(computers) can be easily added to the network by joining additional cables.<\/li>\n<\/ul>\n\n\n\n<p id=\"disadvantages-of-bus-topology\"><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Data transmission is only in a single direction (also known as Half Duplex), meaning it can\u2019t be sent in two opposite directions at the same time, so this layout is not the ideal choice for networks with huge amounts of traffic. <\/li>\n\n\n\n<li>It uses a single cable to transmit data, they\u2019re somewhat vulnerable. If the cable experiences a failure, the whole network goes down, which can be time-consuming and expensive to restore. <\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ring_Topology\"><\/span><strong>Ring Topology <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>In the\u00a0ring network\u00a0topology, the node(computers)s are connected in a closed-loop\u00a0configuration. The data can travel through the ring network in either one direction or both directions, with each device having exactly two neighbors. These bidirectional ring networks are more resilient than bus networks since traffic can reach a node by moving in either direction.\u00a0<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"389\" height=\"358\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-5.png?resize=389%2C358&#038;ssl=1\" alt=\"\" class=\"wp-image-1579\" style=\"width:259px;height:238px\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-5.png?w=389&amp;ssl=1 389w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-5.png?resize=300%2C276&amp;ssl=1 300w\" sizes=\"auto, (max-width: 389px) 100vw, 389px\" \/><\/figure>\n\n\n\n<p><strong>Advantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Since each device is only connected to the ones on either side, when data is transmitted, the packets also travel along the circle, moving through each of the intermediate nodes until they arrive at their destination. <\/li>\n\n\n\n<li>Only one station on the network is permitted to send data at a time, which greatly reduces the risk of packet collisions, making ring topology efficient at transmitting data without errors.<\/li>\n<\/ul>\n\n\n\n<p><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Though it is popular, it is still vulnerable to failure without proper network management. <\/li>\n\n\n\n<li>Since the flow of data transmission moves one direction between nodes along each ring, if one node goes down, it can take the entire network with it. That\u2019s why it is important for each of the nodes to be monitored.<\/li>\n\n\n\n<li>If the transmission line is broken, then entire network gets down. <\/li>\n\n\n\n<li>In a ring topology, all the devices on the network share bandwidth, so the addition of more devices can contribute to overall communication delays.<\/li>\n\n\n\n<li>The entire network must be taken offline to reconfigure, add, or remove nodes. <\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tree_Topology\"><\/span><strong>Tree Topology<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The tree network topology consists of one root node (Center Node), and all other nodes are connected in a hierarchy.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"594\" height=\"291\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/capture.png?resize=594%2C291&#038;ssl=1\" alt=\"\" class=\"wp-image-1560\" style=\"width:424px;height:208px\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/capture.png?w=594&amp;ssl=1 594w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/capture.png?resize=300%2C147&amp;ssl=1 300w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/figure>\n\n\n\n<p><strong>Advantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Combining elements of the star and bus topologies allows for the easy addition of nodes and network expansion. <\/li>\n\n\n\n<li>Troubleshooting errors on the network is also a straightforward process, as each of the branches can be individually assessed for performance issues.<\/li>\n<\/ul>\n\n\n\n<p><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>If any fault occurs in the node, then it becomes difficult to troubleshoot the problem. <\/li>\n\n\n\n<li>It is expensive because of the complete amount of cabling required to connect each device to the next within the hierarchical layout.<\/li>\n\n\n\n<li>A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall network. \u00a0<\/li>\n\n\n\n<li>If new devices are added, then it becomes difficult to reconfigure.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Star_Topology\"><\/span><strong>Star Topology<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer. The central computer is known as a\u00a0<strong>server<\/strong>, and the peripheral devices attached to the server are known as\u00a0<strong>clients<\/strong>. Star topology is the most popular topology in network implementation.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"392\" height=\"306\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-6.png?resize=392%2C306&#038;ssl=1\" alt=\"\" class=\"wp-image-1581\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-6.png?w=392&amp;ssl=1 392w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-6.png?resize=300%2C234&amp;ssl=1 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/figure>\n\n\n\n<p><strong>Advantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Star topology is a familiar technology as its tools are cost-effective. \u00a0<\/li>\n\n\n\n<li>It is easily expandable as new stations can be added to the open ports on the hub. <\/li>\n\n\n\n<li>Star topology networks are cost-effective as it uses inexpensive coaxial cable. <\/li>\n\n\n\n<li>It has a high data speed. It supports a bandwidth of approx 100Mbps. <\/li>\n<\/ul>\n\n\n\n<p><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>If the central hub or switch goes down, then all the connected nodes will not be able to communicate with each other.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Mesh_Topology\"><\/span><strong>Mesh Topology<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It is an arrangement of the network in which computers are interconnected with each other through various redundant connections. <\/li>\n\n\n\n<li>There are multiple paths from one computer to another computer. <\/li>\n\n\n\n<li>It does not contain the switch, hub or any central computer which acts as a central point of communication. <\/li>\n\n\n\n<li>The Internet is an example of the mesh topology. <\/li>\n\n\n\n<li>Mesh topology is mainly used for WAN implementations where communication failures are a critical concern. <\/li>\n\n\n\n<li>Mesh topology can be formed by using the formula: <strong>Number of cables = (n*(n-1))\/2;<\/strong> Where n is the number of nodes that represents the network<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"381\" height=\"299\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-7.png?resize=381%2C299&#038;ssl=1\" alt=\"\" class=\"wp-image-1583\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-7.png?w=381&amp;ssl=1 381w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-7.png?resize=300%2C235&amp;ssl=1 300w\" sizes=\"auto, (max-width: 381px) 100vw, 381px\" \/><\/figure>\n\n\n\n<p><strong>Advantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The mesh topology networks are very reliable as if any link breakdown will not affect the communication between connected computers. <\/li>\n\n\n\n<li>Adding new devices would not disrupt the communication between other devices.<\/li>\n<\/ul>\n\n\n\n<p><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>A mesh topology contains a large number of connected devices such as a router and more transmission media than other topologies.<\/li>\n\n\n\n<li>Mesh topology networks are very large and very difficult to maintain and manage. If the network is not monitored carefully, then the communication link failure goes undetected.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Hybrid_Topology\"><\/span><strong>Hybrid Topology<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The combination of various different topology is known as\u00a0<strong>Hybrid topology<\/strong>.<\/li>\n\n\n\n<li>It is a connection between different links and nodes to transfer the data.<\/li>\n\n\n\n<li>When two or more different topology are combined together is termed as Hybrid topology. For example, if there exist a ring topology in one branch of bank A and bus topology in another branch of bank A, connecting these two topology will result in Hybrid topology.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"588\" height=\"448\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-8.png?resize=588%2C448&#038;ssl=1\" alt=\"\" class=\"wp-image-1585\" style=\"width:391px;height:298px\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-8.png?w=588&amp;ssl=1 588w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/image-8.png?resize=300%2C229&amp;ssl=1 300w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/figure>\n\n\n\n<p><strong>Advantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>If a fault occurs in any part of the network will not affect the functioning of the rest of the network.<\/li>\n\n\n\n<li>Size of the network can be easily expanded by adding new devices without affecting the functionality of the existing network.<\/li>\n\n\n\n<li>This topology is very flexible as it can be designed according to the requirements of the organization.<\/li>\n\n\n\n<li>Hybrid topology is very effective as it can be designed in such a way that the strength of the network is maximized and weakness of the network is minimized.<\/li>\n<\/ul>\n\n\n\n<p><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The design of the Hybrid network is very complex. It is very difficult to design the architecture of the Hybrid network.<\/li>\n\n\n\n<li>The Hubs used in the Hybrid topology are very expensive as these hubs are different from usual Hubs used in other topologies.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"osi-reference-model\"><span class=\"ez-toc-section\" id=\"OSI_Reference_Model\"><\/span><strong>OSI Reference Model<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>OSI<\/strong> \u2013 <strong>Open System Interconnection<\/strong> model is a standard model to describe how data\/information from a software application of one device\/computer moves through a physical medium to a software application in another device\/computer.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>OSI model has seven layers which performs their own functions. <\/li>\n\n\n\n<li>OSI model was developed by the ISO \u2013 International Organization for Standardization in 1984. <\/li>\n\n\n\n<li>These layers are Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer respectively. <\/li>\n\n\n\n<li>The sequence of the layer must be maintained. <\/li>\n\n\n\n<li>The data passes through each layer of OSI model \u2013 from Application to Physical, where each layer performs its functionality independently. <\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"597\" height=\"391\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2021\/12\/image-11.png?resize=597%2C391&#038;ssl=1\" alt=\"\" class=\"wp-image-1378\" style=\"width:567px;height:372px\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2021\/12\/image-11.png?w=597&amp;ssl=1 597w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2021\/12\/image-11.png?resize=300%2C196&amp;ssl=1 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><figcaption class=\"wp-element-caption\">OSI Reference Model<\/figcaption><\/figure>\n\n\n\n<p>Let\u2019s start each layer\u2019s function<\/p>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Application Layer<\/strong> : It is a User interface or a kind of software application that provides an access to use resources on a network and share their data\/information among other devices\/computers. For example, if a user wants to send a document via e-mail from his\/her computer to other device, then a web browser(chrome, Firefox, internet explorer) which he\/she uses to send an e-mail, works as an Application Layer.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Presentation Layer : <\/strong>This layer ensures that the data is in a usable format which is known as Translation. It performs encryption at sender side to convert confidential data into a format which can not be readable by hackers\/crackers and a same way it performs decryption at receiver side to convert data in an original form. It also performs compression to reduce the size of files have a huge size.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Session Layer<\/strong> : It establishes, manages &amp; terminates the session between the devices of sender &amp; receiver. It creates communication channels, called sessions, between devices. It is responsible for opening sessions, ensuring they remain open and functional while data is being transferred, and closing them when communication ends.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Transport Layer<\/strong> : It takes data transferred in the session layer and breaks it into <strong><em>segments<\/em><\/strong> (process divides in a smaller parts) on the transmitting end. It uses the Transmission Control Protocol(TCP) &amp; User Datagram Protocol(UDP) to carry out its tasks. It is responsible for reassembling the <strong>segments<\/strong> on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Network Layer<\/strong> : It is responsible for moving the packets(small parts of large messages) from source to destination. It breaks up segments into network packets, and reassembling the packets on the receiving end. It routs packets by discovering the best path across a physical network. The network layer uses network addresses (IP address) to route packets to a destination node.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Data Link Layer<\/strong> : It provides a reliable and efficient communication between two or more devices. It converts packets into frames which transfers error free to destination. It is mainly responsible for the unique identification of each device that resides on a local network. The Data link layer adds the header and trailer to the frame. The header which is added to the frame contains the hardware destination and source address. It also maintains the rate of data at both the sides.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Physical Layer<\/strong> : \u00a0It defines the way how two or more devices can be connected physically. It also defines the way how network devices are arranged. It determines the type of the signal used for transmitting the information. It transmits an individual bit from one node to another node by physical medium.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"tcp-ip-tcp-stands-for-transmission-control-protocol-a-communications-standard-that-enables-application-programs-and-computing-devices-to-exchange-messages-over-a-network-it-is-designed-to-send-packets-across-the-internet-and-ensure-the-successful-delivery-of-data-and-messages-over-networks\"><span class=\"ez-toc-section\" id=\"TCPIP\"><\/span><strong>TCP\/IP<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>TCP\/IP, or Transmission Control Protocol\/Internet Protocol, is the foundational suite of communication protocols used for the internet and other networks. It enables devices to communicate with each other and facilitates data exchange across diverse networks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"TCP_Transmission_Control_Protocol\"><\/span><strong>TCP :  Transmission Control Protocol<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>TCP is one of the main protocols used in the Internet Protocol Suite. It ensures reliable communication between devices over a network.<\/li>\n\n\n\n<li>TCP is connection-oriented protocol. That means it establishes a connection before data is sent, ensuring that packets are delivered reliably.<\/li>\n\n\n\n<li>TCP verifies that data packets are received accurately and in the correct order. If packets are lost or corrupted, it requests retransmission.<\/li>\n\n\n\n<li>TCP (Transmission Control Protocol) regulates how quickly data is sent to ensure that the device receiving the data can handle it without becoming overloaded.<\/li>\n\n\n\n<li>By controlling the speed of data transmission, it helps maintain smooth communication and prevents data loss or errors due to the receiving device being unable to process the incoming information quickly enough.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"IP_Internet_Protocol\"><\/span><strong>IP: Internet Protocol<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The Internet Protocol (IP) is the method for sending data from one device to another across the internet. <\/li>\n\n\n\n<li>Every device has an IP address that uniquely identifies it and enables it to communicate with and exchange data with other devices connected to the internet. <\/li>\n\n\n\n<li>IP determines the best path for data packets to travel from the source to the destination, often through multiple intermediate devices.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"isp-internet-service-provider\"><span class=\"ez-toc-section\" id=\"ISP_%E2%80%93_Internet_Service_Provider\"><\/span><strong>ISP \u2013 Internet Service Provider<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>An\u00a0<strong>Internet Service Provider<\/strong>\u00a0(<strong>ISP<\/strong>) is a company such as Airtel, Vodafone, Jio, BSNL, MTNL and many more that provides Internet access to companies, families, and even an individual. ISPs use fiber-optics, satellite, copper wire, and other forms to provide Internet access to its customers.<\/li>\n\n\n\n<li>Internet service providers connect your personal or business computer, laptop, mobile device etc to the internet.\u00a0ISPs may be commercial, non-profit, privately owned or community owned companies.<\/li>\n\n\n\n<li>Most providers offer the same types of internet services<strong>\u00a0<\/strong>to customers, including:\n<ul class=\"wp-block-list\">\n<li>Internet Access<\/li>\n\n\n\n<li>E-mail Access<\/li>\n\n\n\n<li>Domain Name Registration<\/li>\n\n\n\n<li>Web hosting<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"intranet-an-intranet-is-a-private-network-contained-within-an-enterprise-that-is-used-to-securely-share-company-information-and-computing-resources-among-employees-an-intranet-can-also-be-used-for-working-in-groups\"><span class=\"ez-toc-section\" id=\"Intranet\"><\/span><strong>Intranet<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>An intranet is a private network contained within an enterprise\/company that is used to securely share company information and computing resources among employees. <\/li>\n\n\n\n<li>Usually each company or organization has their own Intranet network and members\/employees of that company can access the computers in their intranet. <\/li>\n\n\n\n<li>It can not be used outside or other than the area at which it is provided.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"vsat-very-small-aperture-terminal\"><span class=\"ez-toc-section\" id=\"VSAT_%E2%80%93_Very_Small_Aperture_Terminal\"><\/span><strong>VSAT \u2013 Very Small Aperture Terminal<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>\u00a0VSAT is a small-sized earth station used in the transmit\/receive of data, voice and video signals over a satellite communication network. <\/li>\n\n\n\n<li>A VSAT consists of two parts: a transceiver placed outdoors in direct line of sight to the satellite, and a device that is placed indoors to interface the transceiver with the end user\u2019s communications device, such as PC. <\/li>\n\n\n\n<li>The transceiver receives or sends a signal to a satellite transponder. <\/li>\n\n\n\n<li>The satellite sends and receives signals from a ground station computer that acts as a hub for the system. <\/li>\n\n\n\n<li>Each end user is interconnected with the hub station via the satellite, forming a star topology. <\/li>\n\n\n\n<li>The hub controls the entire operation of the network. <\/li>\n\n\n\n<li>For one end user to communicate with another, each transmission must first go to the hub station, which then re transmits it via the satellite to the other end user\u2019s VSAT. <\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.medianigeria.com\/wp-content\/uploads\/2018\/02\/VSAT.jpg?w=812&#038;ssl=1\" alt=\"VSAT - Media Nigeria\" style=\"width:508px;height:356px\" loading=\"lazy\"><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"dns-domain-name-server\"><span class=\"ez-toc-section\" id=\"DNS_%E2%80%93_Domain_Name_Server\"><\/span><strong>DNS \u2013 Domain Name Server<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>DNS\u00a0convert URLs and domain names(www.example.com) into IP addresses that computers can understand and use. <\/li>\n\n\n\n<li>They translate what a user types into a browser into something the machine can use to find a webpage.<\/li>\n\n\n\n<li>DNS (Domain Name Server) is\u00a0mainly used to convert human meaningful name (domain name) to computer meaningful name (IP address) in Internet. <\/li>\n\n\n\n<li>It allows you to use internet more easily by allowing you to specify a meaningful name on your web browser instead of using IP address.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"www-world-wide-web\"><span class=\"ez-toc-section\" id=\"WWW_%E2%80%93_World_Wide_Web\"><\/span><strong>WWW<\/strong> \u2013 <strong>World Wide Web<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The World Wide Web commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interconnected by hyperlinks, and are accessible over the Internet.<\/li>\n\n\n\n<li>We can also describe it as a collection of websites\/web pages stored in web servers and connected to local computers through the internet. <\/li>\n\n\n\n<li>These websites contain text pages, digital images, audios, videos, etc. <\/li>\n\n\n\n<li>Users can access the content of these sites from any part of the world over the internet using their devices such as computers, laptops, cell phones, etc.<\/li>\n\n\n\n<li>With WWW &amp; internet, we can access &amp; display different websites or text\/media etc. in our devices.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"search-engine\"><span class=\"ez-toc-section\" id=\"Search_Engine\"><\/span><strong>Search Engine<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>A search engine is a software system that is designed to carry out web searches. <\/li>\n\n\n\n<li>They search the World Wide Web in a systematic way for particular information specified in a textual web search query that user want to know.<\/li>\n\n\n\n<li>For example, if anyone wants to know the places to visit in Jamnagar, he or she just need to write in Google \u201cPlaces to visit in Jamnagar\u201d and he\/she gets the list of websites, images, videos, maps and many more related to the query. This is the task of search engine.<\/li>\n\n\n\n<li>There are so many search engine available: Google, Bing, MSN, Alta Vista, AoL, Duck Duck Go, Yahoo!, ASK, Yandex and many more. <\/li>\n\n\n\n<li>Among all these search engines, Google is known as the Best as It gives the information at its best.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"remote-login\"><span class=\"ez-toc-section\" id=\"Remote_Login\"><\/span><strong>Remote Login<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It refers to any method that controls or access to remote device\/computer from host\/own computer. <\/li>\n\n\n\n<li>Software applications that allow remote login\/administration are becoming increasingly common as it provides the way to access from that device where we can con available physically. <\/li>\n\n\n\n<li>For example, TeamViewer. With this software you can access remote computer from your computer at your location &amp; its resources too. <\/li>\n\n\n\n<li>It is very continent &amp; time saving as well.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"e-mail-electronic-mail\"><span class=\"ez-toc-section\" id=\"E-mail_%E2%80%93_Electronic_Mail\"><\/span><strong>E-mail \u2013 Electronic Mail <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Electronic Mail, commonly known as E-mail is a method of exchanging data\/messages via internet from one device(computer, mobile, etc.) to another device (computer, mobile, etc) using some special application software or normally web based application.<\/li>\n\n\n\n<li>Like normal mail, E-mail contains main three parts : sender address, receiver address &amp; the message to send. <\/li>\n\n\n\n<li>This can be a simple text, multimedia (video,audio, photos, etc.). <\/li>\n\n\n\n<li>A sender can send an e-mail to one or more than one receiver. This is one of the easiest and convenient way to communicate.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"e-commerce-e-business\"><span class=\"ez-toc-section\" id=\"E-Commerce\"><\/span><strong>E-Commerce <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Electronic Commerce, most commonly known as E-Commerce allows an individual &amp; companies to buy &amp; sell goods &amp; services over the internet. <\/li>\n\n\n\n<li>E-commerce has focused on some of the major segments: Computers, Tablets, Smart Phones &amp; other smart devices. <\/li>\n\n\n\n<li>For example, amazon, flipkart, Ajio, Myntra, etc. are some of the major E-Commerce websites that serve not only goods but other services like, book a cab, book tickets of airline, bus or train, online payment of electricity bill, mobile bill, etc. <\/li>\n\n\n\n<li>Now a days, e-commerce is very popular to buy or sell as it is a convenient for customer to do so.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"e-commerce-e-business\"><span class=\"ez-toc-section\" id=\"E-Business\"><\/span><strong>E-Business<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Electronic Business or E-Business refers to all the business transaction that make online via an internet. <\/li>\n\n\n\n<li>Electronic business differs from electronic commerce as it does not only deal with online transactions of selling and buying of a product and\/or service but also enables to conduct of business processes such as, manufacturing &amp; operations, marketing and sales, customer service etc.<\/li>\n\n\n\n<li>There are several types of e-business models. In the business-to-consumer (B2C) model, sellers offer products and services directly to consumers online, and the buyer purchases them via the internet.<\/li>\n\n\n\n<li>Under the business-to-business (B2B) model, companies use the internet to conduct transactions with one another.<\/li>\n\n\n\n<li>The consumer-to-business (C2B) model defines a type of e-business where consumers create their own value and demand for goods and services. Reverse online auctions are examples of C2B e-business models.<\/li>\n\n\n\n<li>In consumer-to-consumer (C2C) model, consumers are both buyers and sellers via third-party-facilitated online marketplaces, such as eBay. For example, OLX , where consumers can sell\/buy their own goods &amp; get their own price.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"e-governance\"><span class=\"ez-toc-section\" id=\"E-Governance\"><\/span><strong>E-Governance<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Electronic Governance is the application of Information and Communication Technologies (ICTs) for delivering government services to citizens &amp; business in a convenient &amp; efficient manner.<\/li>\n\n\n\n<li>These services include Digital India initiative, National Portal of India, Prime Minister of India portal, Aadhaar, filing and payment of taxes online, digital land management systems, Common Entrance Test etc.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mobile-commerce\"><span class=\"ez-toc-section\" id=\"Mobile_Commerce\"><\/span><strong>Mobile Commerce<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>\u00a0Mobile commerce involves using wireless handheld devices like cellphones and tablets to conduct commercial transactions online, including the purchase and sale of products,\u00a0online banking, and paying bills. <\/li>\n\n\n\n<li>With m-commerce, users can transact anywhere provided there\u2019s a wireless internet provider available in that area. <\/li>\n\n\n\n<li>Mobile commerce has increased rapidly as security issues have been resolved. <\/li>\n\n\n\n<li>Companies like Apple and Google have introduced their own mobile commerce services.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"http-hyper-text-transfer-protocol\"><span class=\"ez-toc-section\" id=\"HTTP_%E2%80%93_Hyper_Text_Transfer_Protocol\"><\/span><strong>HTTP \u2013 Hyper Text Transfer Protocol<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Hyper Text Transfer Protocol is used to send the request from client (web browser) to server &amp; it also receive the response from server to client as well. <\/li>\n\n\n\n<li>It is the data communication protocol used to establish communication between client and server. <\/li>\n\n\n\n<li>That is why it is also known as \u201cRequest Response Protocol\u201d. <\/li>\n\n\n\n<li>HTTP is TCP\/IP based communication protocol, which is used to deliver the data like image files, query results, HTML files etc.. on the World Wide Web (WWW) with the default port is TCP 80. <\/li>\n\n\n\n<li>It provides the standardized way for computers to communicate with each other.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"500\" height=\"209\" src=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/http.png?resize=500%2C209&#038;ssl=1\" alt=\"\" class=\"wp-image-1538\" style=\"width:382px;height:160px\" loading=\"lazy\" srcset=\"https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/http.png?w=500&amp;ssl=1 500w, https:\/\/i0.wp.com\/swatilathia.com\/wp-content\/uploads\/2022\/01\/http.png?resize=300%2C125&amp;ssl=1 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ftp-file-transfer-protocol\"><span class=\"ez-toc-section\" id=\"FTP_%E2%80%93_File_Transfer_Protocol\"><\/span><strong>FTP \u2013 File Transfer Protocol<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>FTP \u2013 File Transfer Protocol allows the process of file downloading and uploading on different computers from the internet.<\/li>\n\n\n\n<li>It also does file management. \n<ul class=\"wp-block-list\">\n<li>Users can list files and directories on the server.<\/li>\n\n\n\n<li>It allows users to delete files on the server.<\/li>\n\n\n\n<li>Users can rename files stored on the server.<\/li>\n\n\n\n<li>Users can create or remove directories on the server.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"telnet\"><span class=\"ez-toc-section\" id=\"TELNET\"><\/span><strong>TELNET<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>TELNET<strong>\u00a0<\/strong>stands for<strong>\u00a0<\/strong>TErminaL NETwork. <\/li>\n\n\n\n<li>It is a type of protocol that allows one computer to connect to remote computer. <\/li>\n\n\n\n<li>It provides access to virtual terminals of remote systems on local area networks or the Internet.\u00a0<\/li>\n\n\n\n<li>Computer which starts connection is known as the<strong>\u00a0<\/strong>client\/local computer. <\/li>\n\n\n\n<li>Computer which is being connected by client computer is known as Remote computer. <\/li>\n\n\n\n<li>Client computer uses telnet client program and the remote computers uses telnet server program. <\/li>\n\n\n\n<li>Telnet is used to edit files, checking mails, running various programs on remote computer.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"domain-names\"><span class=\"ez-toc-section\" id=\"Domain_Names\"><\/span><strong>Domain Names<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>It refers to string of text that maps to numeric IP address, used to access a website from client software. <\/li>\n\n\n\n<li>It is a unique address where your website can be found online. For example, google.com, amazon.in, etc are domain names.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"url-uniform-resource-locator\"><span class=\"ez-toc-section\" id=\"URL_%E2%80%93_Uniform_Resource_Locator\"><\/span><strong>URL \u2013 Uniform Resource Locator<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>URL \u2013 Uniform Resource Locator is a unique identifier used to locate a resource on the internet. It is also referred as Web Address. <\/li>\n\n\n\n<li>Example of URL, https:\/\/swatilathia.wordpress.com\/javascript-events\/index.php indicates a protocol(HTTP), a host name (swatilathia.wordpress.com) &amp; a file name (index.php)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-page\"><span class=\"ez-toc-section\" id=\"Web_Page\"><\/span><strong>Web Page<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Web page is a document available on internet. <\/li>\n\n\n\n<li>Web pages are stored in web servers and are displayed on browser when a user writes a specified URL in a browser. <\/li>\n\n\n\n<li>Web pages are normally created in HTML . Each web page is associated with its unique URL.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-site\"><span class=\"ez-toc-section\" id=\"Web_Site\"><\/span><strong>Web Site<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>A set of related web pages interconnected with each other located under a single domain name is known as web site. <\/li>\n\n\n\n<li>Google.com, Wikipedia.org, etc are example of web site.<\/li>\n\n\n\n<li>Websites are typically dedicated to a particular subject area, such as education, commerce, entertainment, news or\u00a0social networking.\u00a0<\/li>\n\n\n\n<li>The main page of web site is known as home page from where the web site starts. <\/li>\n\n\n\n<li>Users\u00a0can access websites on number of devices, such as\u00a0desktops,\u00a0laptops,\u00a0tablets, and\u00a0smartphones.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-website\"><span class=\"ez-toc-section\" id=\"Types_of_Website\"><\/span><strong>Types of Website<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>The main three types of website : Static, Dynamic &amp; Responsive<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Static Web Site<\/strong> : It contains web pages with fixed content which is something like a printed page that can not be change until &amp; unless we change its code\/script. It shows the same information to every visitor. Static websites are the most basic type of web sites &amp; it is very easy to create as it uses HTML, CSS &amp; JavaScript to design &amp; develop the websites.<\/li>\n\n\n\n<li><strong>Dynamic Web Site :<\/strong> Dynamic websites are those websites that changes the content or layout with every request to the web server. These web sites have their own database to store &amp; retrieve  information. These websites have the capability of producing different content for different users from the same source code file. For example,\u00a0login &amp; signup pages, application &amp; submission forms, inquiry and shopping cart all are the content which are different as per user. To create dynamic websites, mostly server-side scripting language are used like PHP, ASP, JSP, etc.  pages.<\/li>\n\n\n\n<li><strong>Responsive Web Site<\/strong> : Responsive web sites are the sites that display well on variety of devices &amp; windows or screen size from minimum to maximum display size to ensure user satisfaction &amp; usability. These web sites are suitable to every smart device that can display the web page properly according to the size of their screen so that every user can access the content.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-browser\"><span class=\"ez-toc-section\" id=\"Web_Browser\"><\/span><strong>Web Browser<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Web browser is a software application used to access the information on the World Wide Web. When a user requests some information, the web browser fetches the data from a web server and then displays the web page\/web site on the user\u2019s screen.\u00a0For example, Google Chrome, Mozilla Fire fox, opera, Apple safari, Microsoft internet explorer all are web browsers.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-server\"><span class=\"ez-toc-section\" id=\"Web_Server\"><\/span><strong>Web Server<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Web server is a dedicated computer that stores the content of the web site. In simple term, it serves the information to the web client (browser). It is a software &amp; hardware that responds to the client\u2019s(browser) request with the use of HTTP &amp; other protocols. Apache, IIS and many more are examples of web server which are most commonly used.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-hosting\"><span class=\"ez-toc-section\" id=\"Web_Hosting\"><\/span><strong>Web Hosting<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Web hosting is a type of Internet Hosting that provides a facility to host a website for a client. It allows the website to publish on the internet so that everyone can visit &amp; access it.<\/li>\n\n\n\n<li>A web hosting service provider is a business that provides the technologies and services needed for the website to be viewed in the Internet. Websites are hosted or stored on called servers. When Internet users want to view your website, all they need to do is type your website address or domain name into their browser. Their computer will then connect to your server and your webpages\/website will be delivered to them through the browser.<\/li>\n\n\n\n<li>Most hosting companies require that you own your domain in order to host with them. If you do not have a domain, the hosting companies will help you purchase one.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"network-security-concept\"><span class=\"ez-toc-section\" id=\"Network_Security_Concept\"><\/span><strong>Network Security Concept<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Cyber Law<\/strong> : Cyber law also known as Internet Law, is the part of the legal system that is related to legal informatics and supervises the digital circulation of information, e-commerce, software and information security. It focuses many areas, such as Internet Access, freedom of expression, and online privacy. <\/li>\n\n\n\n<li>Cyber laws help to reduce or prevent people from cyber criminal activities with the help of protecting information access from unauthorized people, freedom of speech related to the use of the\u00a0Internet, privacy, communications, email, websites, intellectual property(copyright issues), hardware and software. <\/li>\n\n\n\n<li>As usage of Internet increases day by day, it leads to a huge percentage of legal issues worldwide. This is the reason to include cyber laws.<\/li>\n\n\n\n<li>Cyber law offers legal protections for people who are using the Internet as well as running an online business. It is most important for Internet users to know about the local area and cyber law of their country by which they could know what activities are legal or not on the network. <\/li>\n\n\n\n<li>Also, they can prevent ourselves from unauthorized activities.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Firewall\"><\/span><strong>Firewall<\/strong> : <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. <\/li>\n\n\n\n<li>Firewalls have been a first line of defense in network security for over 25 years. <\/li>\n\n\n\n<li>They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.\u00a0<\/li>\n\n\n\n<li>A firewall can be hardware, software, or both.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cookies\"><\/span><strong>Cookies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Cookies\u00a0are text files with small pieces of data \u2014 like a username, contact number, email address, etc. \u2014 that are used to identify your computer as you use a computer network. <\/li>\n\n\n\n<li>Specific cookies known as HTTP cookies are used to identify specific users and improve your web browsing experience.<\/li>\n\n\n\n<li>Data stored in a cookie is created by the server upon your connection. This data is labeled with an ID unique to you and your computer. <\/li>\n\n\n\n<li>When the cookie is exchanged between your computer and the network server, the server reads the ID and identifies what information to specifically serve to you.<\/li>\n\n\n\n<li>Cookies let websites recognize users and recall their individual login information and preferences, such as Entertainment &amp; News<\/li>\n\n\n\n<li>Customized advertising is the main way cookies are used to personalize your sessions. You may view certain items or parts of a site, and cookies use this data to help build targeted ads that you might enjoy.<\/li>\n\n\n\n<li>Shopping sites use cookies to track items users previously viewed, allowing the sites to suggest other goods they might like and keep items in shopping carts while they continue shopping.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Hackers\"><\/span><strong>Hackers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Hackers are the people who hack devices and systems with good intentions. <\/li>\n\n\n\n<li>They may hack a system for a specified purpose or to gain more knowledge out of it. <\/li>\n\n\n\n<li>They work by finding loopholes(an error) in a given system and by covering these loopholes. <\/li>\n\n\n\n<li>Hackers are basically programmers who gather extensive knowledge regarding programming languages and operating systems (OS). <\/li>\n\n\n\n<li>They never intend to harm, compromise, or damage any system data.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Crackers\"><\/span><strong>Crackers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li>Crackers are people who hack a system by breaking into it and violating it with some bad intentions.<\/li>\n\n\n\n<li>They may hack a system to steal the data\/information or to harm it permanently. <\/li>\n\n\n\n<li>Crackers destroy the data and information contained in a system by getting unauthorized access to its concerned network. <\/li>\n\n\n\n<li>They keep their works hidden because what they do is illegal and mostly prohibited or forbidden. <\/li>\n\n\n\n<li>A cracker can easily bypass your device\u2019s passwords, company websites, social media, personal bank details<strong>\u00a0<\/strong>and can use those details for directly transferring money from your bank.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-payment-system\"><span class=\"ez-toc-section\" id=\"Types_of_Payment_System\"><\/span><strong>Types of Payment<\/strong> <strong>System<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Digital Cash<\/strong> : Digital Cash is\u00a0a form of electronic currency that exists only in cyberspace and has no real physical properties, but offers the ability to use real currency in an electronic format. For example, cryptocurrency like bitcoin can accepted by some of the countries.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Electronic Cheque :<\/strong> An electronic cheque or e-cheque, is\u00a0a form of payment made via the Internet, or another data network, designed to perform the same function as a conventional paper cheque. Since the cheque is in an electronic format, it can be processed in fewer steps. The costs associated with issuing an electronic cheque are comparatively lower than those associated with paper cheque.\u00a0Electronic cheque also come with a lower risk of the associated funds being stolen, as there is no tangible item to intercept. There are multiple levels of authentication to help ensure funds are routed properly.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Smart Card<\/strong> : A smart card is a physical card that has an\u00a0embedded\u00a0integrated chip that acts as a security token. Smart cards are typically the same size as a driver\u2019s license and can be made out of metal or plastic<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-medium-font-size\">\n<li><strong>Debit Card \/ Credit Card :<\/strong> A debit card is a payment card that can be used in place of cash to make purchases.\u00a0The money debits directly from consumer\u2019s bank account. A\u00a0credit card\u00a0is a payment card issued by banks with a pre-set credit limit, helping you make cashless transactions. \u00a0Credit cards has put the condition that cardholders pay back the borrowed money, plus any applicable interest, as well as any additional agreed-upon charges, either in full by the billing date or over time.<\/li>\n<\/ul>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>Computer Network Types of Computer Network A computer network can be categorized by their size. There are mainly four types of computer network. LAN, MAN, WAN, PAN LAN : Local Area Network MAN : Metropolitan Area Network WAN : Wide Area Network PAN : Personal Area Network Network Topology Bus Topology Advantages Disadvantages Ring Topology [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"zakra_page_container_layout":"customizer","zakra_page_sidebar_layout":"customizer","zakra_remove_content_margin":false,"zakra_sidebar":"customizer","zakra_transparent_header":"customizer","zakra_logo":0,"zakra_main_header_style":"default","zakra_menu_item_color":"","zakra_menu_item_hover_color":"","zakra_menu_item_active_color":"","zakra_menu_active_style":"","zakra_page_header":true,"om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-1355","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/swatilathia.com\/index.php?rest_route=\/wp\/v2\/pages\/1355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swatilathia.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/swatilathia.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/swatilathia.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swatilathia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1355"}],"version-history":[{"count":4,"href":"https:\/\/swatilathia.com\/index.php?rest_route=\/wp\/v2\/pages\/1355\/revisions"}],"predecessor-version":[{"id":5406,"href":"https:\/\/swatilathia.com\/index.php?rest_route=\/wp\/v2\/pages\/1355\/revisions\/5406"}],"wp:attachment":[{"href":"https:\/\/swatilathia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}