{"id":1099,"date":"2010-09-15T14:29:18","date_gmt":"2010-09-15T08:59:18","guid":{"rendered":"http:\/\/JitendraZaa.com\/blog\/?p=1099"},"modified":"2016-01-10T22:05:07","modified_gmt":"2016-01-10T22:05:07","slug":"be-7th-sem-it-syllabus-of-rtmnu-nagpur-university-information-technology","status":"publish","type":"post","link":"https:\/\/www.jitendrazaa.com\/blog\/others\/rtm-nu\/be-7th-sem-it-syllabus-of-rtmnu-nagpur-university-information-technology\/","title":{"rendered":"BE 7th sem IT syllabus of RTMNU (Nagpur university &#8211; Information Technology)"},"content":{"rendered":"<p><strong>7IT41 COMPUPTER NETWORKS &amp; INTERNET<\/strong><\/p>\n<p><strong>UNIT-I:<\/strong><br \/>\nIntroduction: The use of computer networks, networks for companies, network for people, social issues. Network\u00a0hardware. LAN&#8217;s, MAN&#8217;s, WAN&#8217;s, wireless networks, internetworks, network software, protocol hierarchies, design\u00a0issues for layers, interfaces and services, connectionless oriented and connectionless services, service primitives,\u00a0relationship of services to protocols, the OSI reference model, TCP\/IP reference model, comparison of OSI and TCP\/IP\u00a0reference model, critique of OSI model &amp; protocols, critique of TCP\/IP reference model. Example networks &#8211; novel!\u00a0Netware, ARPANET, NSFNET, the internet, SMDS, X.25 network, frame relay, network standardization &#8211; who&#8217;s who in\u00a0the telecommunication world, who&#8217;s who in international standards world, who&#8217;s who in the internet standards world.<br \/>\n<!--more--><strong>UNIT-lI:<\/strong><br \/>\nPhysical Layer &#8211; The theoretical basis for data communication-Fourier analysis, bandwidth-limited signals, maximum\u00a0data rate of a channel, transmission media-magnetic media, twisted pair coaxial cable, fiber optics. Wireless\u00a0transmission, microwave transmission, infrared and millimeter waves, light wave transmission. Telephone system\u00a0structure, politics of telephones, local loop, trunks and multiplexing, switching, narrowband ISDN &#8211; services, architecture,\u00a0interface, perspective on N-ISDN, broadband ISDN &amp; ATM-virtual circuits versus circuit switching, transmission in ATM<br \/>\nnetworks, ATM switches.<\/p>\n<p><strong>UNIT-Ill<\/strong><br \/>\nData Link Layer &#8211; design issues &#8211; services provided to the network Layer, framing, error control, flow control, error\u00a0correcting &amp; detecting codes, elementary data link protocols, simplex stop and wait simplex protocol for noisy channel,\u00a0sliding window protocols-one bit protocol, go back protocol, selective repeat protocol. The medium access sub layer &#8211;\u00a0static and dynamic channel allocation in LANs and MANs, Multiple access protocols &#8211; ALOHA. CSIIA, collision free\u00a0protocols, limited contention protocols, wavelength division multiple access protocols, wireless LAN protocols, IEEE\u00a0Standards 802 for LAN and MANs-802.3 &amp; Ethernet, token bus. token ring, comparison 802.6, 802.2.<\/p>\n<p><strong>UNIT-IV<\/strong><br \/>\nThe Network Layer &#8211; Design issues, services provided to the transport layer, internal organization, comparison of virtual\u00a0circuit and datagram subnets, routing algorithms. Optimality principle, shortest path routing, flooding, flow-based routing,\u00a0distance vector routing, link state routing, hierarchical routing, broadcast &amp; multicast routing, congestion control\u00a0algorithms, general principles prevention policies, traffic shaping. flow specifications, congestion control in virtual circuit\u00a0subnets. choke packets, load shedding, jitter control, congestion control for multicasting. Internetworking &#8211; how networks\u00a0differ, concatenated Virtual circuits, connectionless Internetworking tunneling. internetwork routing, fragmentation,\u00a0firewalls, the Network layer in the internet &#8211; IP protocol, IP address. subnets, internet control protocols, OSPF. BGP,<br \/>\ninternet, Multicasting.<\/p>\n<p><strong>UNIT IV<\/strong><br \/>\nTransport and Application Layer &#8211; services provided to the upper layer, Quality of Service, transport service primitives,\u00a0elements of transport protocols, addressing, establishing a connection, releasing a connection, flow control &amp; buffering,\u00a0multiplexing, crash recovery, network security &#8211; traditional cryptography, fundamental principles, secret-key algorithms,\u00a0public key algorithms, authentication protocols, digital signatures, social issues.<\/p>\n<p><strong>TEXTBOOKS::<\/strong><br \/>\n1.Computer Networks Third Edition by Andrew Tanenbaum (PHI Pub.)<br \/>\nREFERENCE BOOKS:<br \/>\n1.Data. &amp; Computer Communication, 5th Ed., by William Stallings (PHI Pub.)<br \/>\n2.Data &amp; Network Communications by Michael A. Miller<br \/>\n3.Computer Networks &amp; E-Commerce by Parag Diwan (Pentagaon Pub.)<\/p>\n<p><strong>7IT42 DIGITAL SIGNAL PROCESSING<\/strong><\/p>\n<p><strong>UNIT-I<\/strong><br \/>\nDiscrete time signals and systems, linearity, time variance, casuality, stability properties of LTI casual ystem, response\u00a0of LTI systems to various inputs, convolution, sampling theorem.<\/p>\n<p><strong>UNIT-Il<\/strong><br \/>\nFrequency domain description of signals &amp; system. fourier transform of discrete time signals, properties of DFT, DFTS\u00a0of typical discrete time signals.<\/p>\n<p><strong>UNIT-Ill<\/strong><br \/>\nThe Z-transform, properties. ROCs relation with fourier transform. system function, inverse Z transform, solution of\u00a0difference equation using unilateral Z-transform,<\/p>\n<p><strong>UNIT-IV<\/strong><br \/>\nDigital filter design techniques design of FIR filters based on windows, design of IIR digital filters from analog filters.<\/p>\n<p><strong>UNIT-V<\/strong><br \/>\nIntroduction to FFT algorithms decimation in time &#8211; FFT algorithms, decimation in frequency FFT algorithms. DCT.<\/p>\n<p><strong>TEXT BOOKS:<\/strong><br \/>\n1.Digital Signal Processing: Alen V.Oppenheim . W.Schaffer (PHI Pub<br \/>\n2.Digital Signal Processing: Proskies and Morialkies (PHI Pub.)<\/p>\n<p><strong>REFERENCE BOOKS:<\/strong><br \/>\n1.Theory and Application of Signal Processing by Rabiner &amp; Gold (PHl Pub.)<br \/>\n2.Digital Filter Design and Analysis by Andreas Antoniou (TMH Pub.)<br \/>\nPRACTICALS based on above syllabus using MATLAB and TMS C320 C50.<\/p>\n<p><strong>7IT43 COMPUTER SYSTEM SECURITY<\/strong><\/p>\n<p><strong>UNIT-I:<\/strong><br \/>\nIntroduction: attacks, services, mechanisms, security attacks, security services, a model for internet work security,\u00a0encryption model, steganography, classical encryption techniques, modern techniques &#8211; simplified DES, block cipher\u00a0principles, data encryption standard, strength of DES, differential &amp; linear cryptanalysis, block cipher design principles,\u00a0block cipher modes of operation, Algorithm &#8211; triple DES, international data encryption algorithm, blowfish, RCS, CAST,\u00a0RC2, characteristics of advanced symmetric block ciphers.<\/p>\n<p><strong>UNIT-lI:<\/strong><br \/>\nConfidentiality using conventional encryption: placement of encryption function, traffic confidentiality, key distribution,\u00a0random number generation. Public key cryptography: principles, RSA algorithm, key management, diffie-heliman key\u00a0exchange, elliptic curve remainder theorem, discrete logarithms.<\/p>\n<p><strong>UNIT-III:<\/strong><br \/>\nMessage Authentication &amp; hash functions: Authentication requirements, functions, codes, hash functions, security ofhash function &amp; MACs. Hash &amp; Mac algorithms: MD5 message digest algorithm, secure hash algorithm (SHA- I),\u00a0RJPEMD- 160, HMAC digital signatures &amp; authentication protocols: digital signatures, authentication protocols, digital<br \/>\nsignature standard.<\/p>\n<p><strong>UNIT-IV:<\/strong><br \/>\nNetworks security practice: authentication applications &#8211; kerberos. X.509 directory authentication service, kerberos\u00a0encryption techniques, E-mail security: pretty Good privacy, S\/MIME, data compression using ZIP Radix-64 conversion.\u00a0PGP random number generation, IP security: overview, architecture, authentication header, encapsulating security\u00a0payload, combining security associations, key management.<\/p>\n<p><strong>UNIT-V:<\/strong><br \/>\nWeb security: requirements, secure sockets layer &amp; transport layer security, secure electronic transaction, networksmanagement security: basic concepts of SNMP, SNMPvI community facility, SNMPv3.\u00a0System Security: Intruders, viruses and worms &#8211; intruders, viruses &amp; related threats, Firewalls:<br \/>\ndesign principles, trusted systems.<\/p>\n<p><strong>TEXTBOOKS::<\/strong><br \/>\nCryptography and networks security principles &amp; practice 2\/c by William Stalings (Pearson Education prentice Hall).<br \/>\n2. Networks security Essentials Applications &amp; standards by William Stalings (Pearson Education, LPF).<\/p>\n<p><strong>REFERENCE BOOKS::<\/strong><br \/>\n1. Cryptography in C and C++ by Michael Welschenbach (A press IDG Books India).<br \/>\n2. Introduction to Data Compression 2\/c by Khalid Sayood (Morgan kaufmann\/Harcourt India).<\/p>\n<p><strong>7it44\/2 ARTIFICIAL INTELLIGENCE<\/strong><\/p>\n<p><strong>UNIT-I<\/strong><br \/>\nIntroduction: AI problems, AI techniques, Defining problem as a state space representation, problem characteristics, production system characteristics. Heuristic search techniques: generate and test, hill climbing, best-first search, problem reduction, constraint satisfaction, means-ends analysis.<\/p>\n<p><strong>UNIT-II<\/strong><br \/>\nKnowledge Representation : Issues, predicate &amp; Proposition resolution, representing knowledge using rules, frames &amp; scripts, semantic networks, conceptual dependency, truth maintenance system.<\/p>\n<p><strong>UNIT-III<\/strong><br \/>\nReasoning techniques: elementary search techniques- depth first search, breadth first search, forward &amp; backward reasoning, winding unwinding, recursive &amp; backtracking algorithm, uncertainty reasoning- probability theory, bayerian networks, certainty factors methods, basics of fuzzy logic, nonmonotonoc reasoning system.<\/p>\n<p><strong>UNIT-IV<\/strong><br \/>\nGame playing: minimax search, alpha-beta cutoffs, planning-block world problems, STRIPS&lt; hierarchical planning, nonlinear planning natural language processing- grammar &amp; language, chomsky hierarchy, transformational grammar, case grammar, systemic grammar, semantic grammar, basic parsing technique, transition networks RTN, ATN, semantic analysis &amp; representation structures, natural language generation.<\/p>\n<p><strong>UNIT-V<\/strong><br \/>\nLearning: block architecture of learning system,types of learning- rote learning, learning by taking advice, learning from example, learning by analogy, Expert system- rule base architechture, non production system architecture, expert system shell, knowledge acquisition, knowledge system building tools.<\/p>\n<p><strong>TEXT BOOK :<\/strong><br \/>\n1. Artificial intelligence by E. Rich &amp; K. Knight(TMH Pub)<\/p>\n<p><strong>REFERENCE BOOKS :<\/strong><br \/>\n1. introduction to artificial intelligence &amp; expert system by D. W. Ptterson(PHI Pub)<br \/>\n2. principles of artificial intelligence by Nilsson N.J. (Narosa Pub)<\/p>\n<p><strong>7IT45\/2 MULTIMEDIA SYSTEMS<\/strong><\/p>\n<p><strong>UNIT-I<\/strong><br \/>\nMultimedia &#8211; definitions, CD-ROM and the multimedia highway. uses of multimedia, introduction to making multimedia, the stages<br \/>\nof project, requirements to make good multimedia, multimedia skills and training, the multimedia tea, training opportunities in<br \/>\nmultimedia.<\/p>\n<p><strong>UNIT-Il:<\/strong><br \/>\nMultimedia hardware, macintosh and windows production platforms, hardware peripherals, connections, memory and storage<br \/>\ndevices, input devices output hardware, communication devices, media software, basic tools, making instant multimedia authoring<br \/>\ntools.<\/p>\n<p><strong>UNIT-Ill:<\/strong><br \/>\nMultimedia building blocks &#8211; text, sound. images, animation, video.<\/p>\n<p><strong>UNIT-IV:<\/strong><br \/>\nAssembleing and delivering a project, planning and costing. designing and producing, content and talent,<br \/>\ndelivering. CD-ROM technology. DVD Tech.<\/p>\n<p><strong>UNIT-V:<\/strong><br \/>\nMultimedia and Internet &#8211; History. web servers, web browsers, VRML, working on the web text, animation,<br \/>\nimages and sound for the web, multimedia applications, media communication, media consumption, media<br \/>\nentertainment and multimedia games.<\/p>\n<p><strong>TEXT BOOKS::<\/strong><br \/>\n1.Multimedia Making Work, by Tay Vaughan (TMH), 3rd Ed.<br \/>\n<strong>REFERENCE BOOKS:<\/strong><br \/>\n1.Multimedia systems design by K. Andleigh, K. Thakkrar (PHi Pub.).<br \/>\n2.Multimedia: Computing, Communications &amp; Applications<br \/>\nby Raif Stein Metz and Kiara Nahrstedt.<br \/>\n3.Advanced Multimedia Programming by Steve Rimmer (McGraw Hill Pub<br \/>\n4.Multimedia Literacy by Fred T. Hofstetter (McGraw Hill Pub.)<\/p>\n<p><strong>7IT44\/1 OPERATIONS RESEARCH<\/strong><\/p>\n<p><strong>UNIT-I<\/strong><br \/>\nDefinitions, characteristics and limitations of O.R., phases of O.R., modelling in O.R., tool techniques of O.R., linear<br \/>\nprogramming, formulation, solution of L.P.P., graphical method, simplex method, duality in L.P.P.<\/p>\n<p><strong>UNIT-II<\/strong><br \/>\nAllocation models &#8211; Assignment models multiple optima, &#8211; prohibited assignment, transportation model, prohibited and<br \/>\npreferred routes, degeneracy.<\/p>\n<p><strong>UNIT-Ill<\/strong><br \/>\nNetwork analysis: Basic concept of network diagram, network construction, CPM, PERT, floats<br \/>\nin network analysis, cost analysis of project.<\/p>\n<p><strong>UNIT-IV<\/strong><br \/>\nQueuing theory: Queuing process, components of queuing system, M\/M\/I(OO\/FIFO) model, simulation, Monte Carlo<br \/>\nsimulation, concept and application in various areas such as queuing system, network.<\/p>\n<p><strong>UNIT-V<\/strong><br \/>\nMaintenance and Replacement Problems: Models for routine maintenance and preventive maintenance decision,<br \/>\nreplacement models that deteriorate with time and those fail completely.<\/p>\n<p><strong>TEXT BOOKS::<\/strong><br \/>\n1.Problems in Operation Research by P.K. Gupta &amp; Man Mohan (Khanna Pub.)<br \/>\n2.Mathematical Models in Operation Research by .1K. Sharma (Macmillan Pub.)<\/p>\n<p><strong>REFERENCE BOOKS::<\/strong><br \/>\n1 introduction to Operation Research by Hiller &amp; Liberman (Holden Day Inc., Sanfransico)<br \/>\n2.Operations Research by Kantiswaroop &amp; Gupta (S.Chand Pub.)<br \/>\n3.Principles of Operation Research by Wagner (PHI Pub.)<br \/>\n4.Operations Research by Dr. B.S. God &amp; S.K. Mittal (Pragati Prakashan)<\/p>\n<p><strong>7IT44\/3 VLSI DESIGN<\/strong><\/p>\n<p><strong>UNIT-I:<\/strong><br \/>\nSwitching algebra theorems, simplification of boolean functions using karnaugh maps, of combinational logic circuits,<br \/>\nfault detection and location in two level circuits, clock concept in fllpflops, shift registers.<\/p>\n<p><strong>UNIT-II:<\/strong><br \/>\nIntroduction to CMOS circuit, MOS Transistorv theory, CMOS processing technology, circuit characterization and<br \/>\nperformance estimation, CMOS circuit and logic design.<\/p>\n<p><strong>UNIT-Ill:<\/strong><br \/>\nDesign of synchronous sequential machines using Mealy and Moore principles, minimization of state machines and their<br \/>\nstandard for ms FPGA, PLA, PLA, PLG.<\/p>\n<p><strong>UNIT-IV:<\/strong><br \/>\nIntroductory concepts of VHDL and Verilog language, HDL based programs for decoder, encoder, multiplexer, counters,<br \/>\nflipfiops, and finite state machines<\/p>\n<p><strong>UNIT-V:<\/strong><br \/>\nArchitecture of 8 bit and 16-bit processors namely 8085. 8086 Concepts of increasing the speed of processor,<br \/>\narchitecture of other advanced processors, memory management, memory controllers. Introductory concepts of USB<br \/>\nAND PCI buses.<\/p>\n<p><strong>TEXT BOOKS<\/strong><br \/>\n1.Principles of CMOS VLSI Design by Weste and Eshraghian (Addison-Wesley Pub.)<\/p>\n<p><strong>REFERENCE BOOKS:<\/strong><br \/>\n1.Digital logic and Computer Design by Morris Mano (PHI Pub.)<br \/>\n2.A VHDL Primer by Dr. Bhasker (Addison-Welsey Longman Pub.)<br \/>\n3.Verilog by Palnitkar.<br \/>\n4.VHDL by Nawabi (McGraw Hill Pub.)<br \/>\n5.VHDL by Perry.<br \/>\n6.Microprocessors Architecture Programming and Application with 8080\/8085 by R.S.<br \/>\nGaonkar (Wiley Eastern Pub.)<br \/>\n7.Microporcessors and Digital Systems by DV. Hall (TMH Pub.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BE 7th sem IT syllabus of RTMNU (Nagpur university &#8211; Information Technology)<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"jz_research_post":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8],"tags":[357],"class_list":["post-1099","post","type-post","status-publish","format-standard","hentry","category-rtm-nu","tag-students"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":585,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/rtm-nu\/be-6th-sem-cse-syllabus-of-rtm-nagpur-university\/","url_meta":{"origin":1099,"position":0},"title":"BE 6th sem CSE syllabus of RTM Nagpur University","author":"Jitendra","date":"July 7, 2010","format":false,"excerpt":"Sixth Semester Syllabus of Computer Science of Nagpur University","rel":"","context":"In &quot;RTM NU&quot;","block_context":{"text":"RTM NU","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/rtm-nu\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2320,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/rtm-nu\/be-8th-sem-cse-syllabus-of-rtm-nagpur-university\/","url_meta":{"origin":1099,"position":1},"title":"BE 8th sem CSE syllabus of RTM Nagpur University","author":"Jitendra","date":"August 3, 2011","format":false,"excerpt":"BE 8th sem CSE syllabus of RTM Nagpur University","rel":"","context":"In &quot;RTM NU&quot;","block_context":{"text":"RTM NU","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/rtm-nu\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2319,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/rtm-nu\/be-7th-sem-cse-syllabus-of-rtm-nagpur-university\/","url_meta":{"origin":1099,"position":2},"title":"BE 7th sem CSE syllabus of RTM Nagpur University","author":"Jitendra","date":"August 3, 2011","format":false,"excerpt":"BE 7th sem CSE syllabus of RTM Nagpur University","rel":"","context":"In &quot;RTM NU&quot;","block_context":{"text":"RTM NU","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/rtm-nu\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31534,"url":"https:\/\/www.jitendrazaa.com\/blog\/ai\/mcp-vs-a2a-vs-acp-vs-anp-complete-ai-agent-protocol-guide\/","url_meta":{"origin":1099,"position":3},"title":"MCP vs A2A vs ACP vs ANP: Complete AI Agent Protocol Guide | February 2026","author":"Jitendra","date":"February 17, 2026","format":false,"excerpt":"Master AI agent communication protocols MCP, A2A, ACP, and ANP. Learn when to use each protocol, architecture differences, real-world implementation scenarios, and how they work together in enterprise systems.","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/ai\/"},"img":{"alt_text":"AI Agent Communication Protocols Guide: MCP, A2A, ACP, ANP - Featured Image 2026","src":"https:\/\/i0.wp.com\/www.jitendrazaa.com\/blog\/wp-content\/uploads\/2026\/02\/AI-Agent-Communication-Protocols-MCP-A2A-ACP-ANP-Guide-featured.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.jitendrazaa.com\/blog\/wp-content\/uploads\/2026\/02\/AI-Agent-Communication-Protocols-MCP-A2A-ACP-ANP-Guide-featured.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.jitendrazaa.com\/blog\/wp-content\/uploads\/2026\/02\/AI-Agent-Communication-Protocols-MCP-A2A-ACP-ANP-Guide-featured.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.jitendrazaa.com\/blog\/wp-content\/uploads\/2026\/02\/AI-Agent-Communication-Protocols-MCP-A2A-ACP-ANP-Guide-featured.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.jitendrazaa.com\/blog\/wp-content\/uploads\/2026\/02\/AI-Agent-Communication-Protocols-MCP-A2A-ACP-ANP-Guide-featured.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1554,"url":"https:\/\/www.jitendrazaa.com\/blog\/java\/snmp\/terminologies-used-in-snmp\/","url_meta":{"origin":1099,"position":4},"title":"Terminologies used in SNMP","author":"Jitendra","date":"February 23, 2011","format":false,"excerpt":"Terminologies used in SNMP","rel":"","context":"In &quot;SNMP&quot;","block_context":{"text":"SNMP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/java\/snmp\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1092,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/rtm-nu\/be-6th-sem-it-syllabus-of-rtmnu-nagpur-university-information-technology\/","url_meta":{"origin":1099,"position":5},"title":"BE 6th sem IT syllabus of RTMNU (Nagpur university &#8211; Information Technology)","author":"Jitendra","date":"September 15, 2010","format":false,"excerpt":"BE 6th sem IT syllabus of RTMNU (Nagpur university - Information Technology)","rel":"","context":"In &quot;RTM NU&quot;","block_context":{"text":"RTM NU","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/rtm-nu\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/1099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/comments?post=1099"}],"version-history":[{"count":1,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/1099\/revisions"}],"predecessor-version":[{"id":5216,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/1099\/revisions\/5216"}],"wp:attachment":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/media?parent=1099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/categories?post=1099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/tags?post=1099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}