{"id":363,"date":"2018-01-22T12:22:04","date_gmt":"2018-01-22T12:22:04","guid":{"rendered":"http:\/\/learnlearn.uk\/gcsecs\/?page_id=363"},"modified":"2019-03-19T08:35:18","modified_gmt":"2019-03-19T08:35:18","slug":"introduction-to-networking","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/","title":{"rendered":"Introduction to networks"},"content":{"rendered":"\n<div class=\"arconix-tabs-horizontal\"><ul class=\"arconix-tabs\"><li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Introduction\"><a class=\"\" href=\"#tab-Introduction\">Introduction<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Client-ServerNetworks\"><a class=\"\" href=\"#tab-Client-ServerNetworks\">Client - Server Networks<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-LAN\"><a class=\"\" href=\"#tab-LAN\">LAN<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-WAN\"><a class=\"\" href=\"#tab-WAN\">WAN<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-PeertoPeerNetworks\"><a class=\"\" href=\"#tab-PeertoPeerNetworks\">Peer to Peer Networks<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-NetworkTopology\"><a class=\"\" href=\"#tab-NetworkTopology\">Network Topology<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Resources\"><a class=\"\" href=\"#tab-Resources\">Resources<\/a><\/li><\/ul>\n<div class=\"arconix-panes\"><div class=\"arconix-pane pane-Introduction\">\n<div class=\"arconix-column-two-thirds\">\n<h3><strong>Why have networks?<\/strong><\/h3>\n<p>The original computers were standalone computers, not connected to any other machine or device. As computers became more widely used in the military, universities and industry, the need to connect computers together became paramount.<\/p>\n<p>The advantages of networking include:<\/p>\n<ul>\n<li>Hardware sharing, such the sharing of printers and scanners.<\/li>\n<li>Communication &#8211; the ability to send information between computers, networks and countries.<\/li>\n<\/ul>\n<p>The disadvantages of networking include:<\/p>\n<ul>\n<li>Reduced security &#8211; each new device added to network is a new potential site of attack for a hacker.<\/li>\n<li>Increased complexity &#8211; there are more devices to configure and more devices to break<\/li>\n<li>Increased cost &#8211; networks require additional dedicated hardware to function.<\/li>\n<\/ul>\n<\/div>\n<div class=\"arconix-column-one-third\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-1811\" src=\"https:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/network.png\" alt=\"network\" width=\"228\" height=\"221\" \/><\/p>\n<\/div>\n<\/div>\n<div class=\"arconix-pane pane-Client-ServerNetworks\">\n<p><strong>Client &#8211; Server Networks<\/strong><\/p>\n<p>Most organisations use a form of client &#8211; server networks. This is where access to network resources and overall control of the network is governed by the <strong>server<\/strong>. A server is a special kind of computer that is designed to cope with a large number of requests at the same time.<\/p>\n<p>Servers control:<\/p>\n<ul>\n<li>User access levels and authentication<\/li>\n<li>File access and backup<\/li>\n<li>Hardware resource sharing(such as printers and scanners)<\/li>\n<li>Internet connection sharing and access control<\/li>\n<\/ul>\n<p>Users log on to<strong> client<\/strong> computers, which connect to the network and access the shared resources.<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_1807\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/clientservermodel.jpg\"><img aria-describedby=\"caption-attachment-1807\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-1807 size-medium\" src=\"https:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/clientservermodel-300x172.jpg\" alt=\"clientservermodel\" width=\"300\" height=\"172\" \/><\/a><p id=\"caption-attachment-1807\" class=\"wp-caption-text\">The Client Server Model. Source: Wikipedia<\/p><\/div>\n<\/div>\n<div class=\"arconix-pane pane-LAN\">\n<p><strong>Local Area Network<\/strong><\/p>\n<p>A client &#8211; server network located in a single location is known as a <strong>Local Area Network<\/strong> (LAN). These networks are usually located in a single building.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-778\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/lan-diagram.png\" alt=\"\" width=\"665\" height=\"495\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/lan-diagram.png 665w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/lan-diagram-300x223.png 300w\" sizes=\"(max-width: 665px) 100vw, 665px\" \/><\/p>\n<\/div>\n<div class=\"arconix-pane pane-WAN\">\n<h3>Wide Area Network<\/h3>\n<p>If an organisation is spread across a large site (such as a university campus) then each area would contain a single LAN, but all the LANs would be joined together using a <strong>bridge, router or modem<\/strong>, in order to form a large <strong>Wide Area Network<\/strong>.<\/p>\n<p>This allows multiple LANs to:<\/p>\n<ul>\n<li>Share access to devices such as printers and scanners<\/li>\n<li>Share file access across multiple LANs<\/li>\n<li>Share access to a single internet service.<\/li>\n<\/ul>\n<p>The <strong>internet<\/strong> is a very, very large WAN.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-779\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/wan-diagram-with-lan.jpg\" alt=\"\" width=\"721\" height=\"962\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/wan-diagram-with-lan.jpg 721w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/wan-diagram-with-lan-225x300.jpg 225w\" sizes=\"(max-width: 721px) 100vw, 721px\" \/><\/p>\n<\/div>\n<div class=\"arconix-pane pane-PeertoPeerNetworks\">\n<h3>Peer to Peer Networks<\/h3>\n<p>Peer to Peer networks are that are usually temporary and quick to set up. They are usually used for temporary file and resource sharing, where a larger client-server network is not needed. Each device connected to a Peer to Peer network is a<strong> node<\/strong>, and each node forwards on data to all other nodes in range.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-781\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/peer-to-peer-network2.png\" alt=\"\" width=\"732\" height=\"310\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/peer-to-peer-network2.png 732w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/peer-to-peer-network2-300x127.png 300w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/p>\n<p><strong>Advantages<\/strong><\/p>\n<div class=\"arconix-list\" data-arconix-icon=\"fa-chevron-circle-right\" data-arconix-color=\"black\">\n<ul>\n<li>Quick, easy and cheap to set up &#8211; no server, switch or routers required.<\/li>\n<li>Decentralised, meaning that if one &#8216;node&#8217; goes down, the network still remains up.<\/li>\n<li>Some peer-to-peer networks (such as TOR networks) allow users to communicate anonymously, making it difficult to trace user activity.<\/li>\n<\/ul>\n<\/div>\n<p><strong>Disadvantages<\/strong><\/p>\n<div class=\"arconix-list\" data-arconix-icon=\"fa-chevron-circle-right\" data-arconix-color=\"black\">\n<ul>\n<li>No access the the facilities that servers provide ( file backup, use authentication)<\/li>\n<li>Less secure than standard networks<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"arconix-pane pane-NetworkTopology\">\n<h3>Star and mash topology<\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-782\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/topology-types.png\" alt=\"\" width=\"696\" height=\"273\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/topology-types.png 696w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/topology-types-300x118.png 300w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h3>Star Topology<\/h3>\n<p>This is the type of topology most commonly used for client-server networks.<\/p>\n<p><strong>Advantages<\/strong><\/p>\n<ul>\n<li>Easier to manage and more secure<\/li>\n<li>Fast overall network speed due dedicated hardware<\/li>\n<\/ul>\n<p><strong>Disadvantages<\/strong><\/p>\n<ul>\n<li>If the switch or server goes down, the whole network goes down.<\/li>\n<li>Expensive to set up<\/li>\n<\/ul>\n<h3>Mesh Topology<\/h3>\n<p>This type of topology is commonly used to peer to peer networks.<\/p>\n<p><strong>Advantages<\/strong><\/p>\n<ul>\n<li>Quick and cheap to set up<\/li>\n<li>If one node goes down, the whole network doesn&#8217;t go down<\/li>\n<li>Can be used to connect devices where wireless \/ wired internet access doesn&#8217;t exist<\/li>\n<\/ul>\n<p><strong>Disadvantage<\/strong><\/p>\n<ul>\n<li>Generally slower network than star.<\/li>\n<li>Less secure<\/li>\n<\/ul>\n<\/div>\n<div class=\"arconix-pane pane-Resources\">\n<p><a href=\"https:\/\/www.bbc.com\/bitesize\/guides\/zh4whyc\/revision\/7\">https:\/\/www.bbc.com\/bitesize\/guides\/zh4whyc\/revision\/7<\/a><\/p>\n<div id=\"attachment_837\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-wordsearch.jpg\"><img aria-describedby=\"caption-attachment-837\" decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-837\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-wordsearch-300x263.jpg\" alt=\"\" width=\"300\" height=\"263\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-wordsearch-300x263.jpg 300w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-wordsearch-768x673.jpg 768w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-wordsearch.jpg 1020w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-837\" class=\"wp-caption-text\">Network Terminology Wordsearch<\/p><\/div>\n<div id=\"attachment_843\" style=\"width: 279px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-crossword.png\"><img aria-describedby=\"caption-attachment-843\" decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-843\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-crossword-269x300.png\" alt=\"\" width=\"269\" height=\"300\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-crossword-269x300.png 269w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-crossword-768x858.png 768w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-crossword-917x1024.png 917w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-terminology-crossword.png 1110w\" sizes=\"(max-width: 269px) 100vw, 269px\" \/><\/a><p id=\"caption-attachment-843\" class=\"wp-caption-text\">Network Terminology Crossword<\/p><\/div>\n<p><a href=\"https:\/\/drive.google.com\/open?id=1AF9yyVj9lvNfucPkEgLYEZo-pSr8Z389\">Networking Unit Flashcards<\/a><\/p>\n<p><a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1WgjazCYSQXdGn_2hhojNliJdT2_2Dnz9UzJgtHDlbHk\/edit?usp=sharing\">Networking Unit Keywords and Definitions<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introduction to networks - GCSE Computer Science Theory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to networks - GCSE Computer Science Theory\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/\" \/>\n<meta property=\"og:site_name\" content=\"GCSE Computer Science Theory\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-19T08:35:18+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/network.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/\",\"name\":\"Introduction to networks - GCSE Computer Science Theory\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\"},\"datePublished\":\"2018-01-22T12:22:04+00:00\",\"dateModified\":\"2019-03-19T08:35:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"OCR GCSE Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/gcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction to networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"name\":\"GCSE Computer Science Theory\",\"description\":\"Just another My Blog site\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\",\"name\":\"GCSE Computer Science Theory\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"GCSE Computer Science Theory\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introduction to networks - GCSE Computer Science Theory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/","og_locale":"en_GB","og_type":"article","og_title":"Introduction to networks - GCSE Computer Science Theory","og_url":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/","og_site_name":"GCSE Computer Science Theory","article_modified_time":"2019-03-19T08:35:18+00:00","og_image":[{"url":"http:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/network.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/","url":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/","name":"Introduction to networks - GCSE Computer Science Theory","isPartOf":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#website"},"datePublished":"2018-01-22T12:22:04+00:00","dateModified":"2019-03-19T08:35:18+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/gcsecs\/introduction-to-networking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"OCR GCSE Computer Science Home","item":"https:\/\/learnlearn.uk\/gcsecs\/"},{"@type":"ListItem","position":2,"name":"Introduction to networks"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/gcsecs\/#website","url":"https:\/\/learnlearn.uk\/gcsecs\/","name":"GCSE Computer Science Theory","description":"Just another My Blog site","publisher":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization","name":"GCSE Computer Science Theory","url":"https:\/\/learnlearn.uk\/gcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"GCSE Computer Science Theory"},"image":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/gcsecs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":null,"_links":{"self":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/363"}],"collection":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":16,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/363\/revisions"}],"predecessor-version":[{"id":928,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/363\/revisions\/928"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/media?parent=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}