301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Email Software Network Security Business Tech Term Productivity Internet Hosted Solutions Computer Data Data Backup Mobile Devices Managed IT Services Backup Data Recovery Microsoft Ransomware User Tips IT Support Google Productivity Efficiency Managed Service Provider Outsourced IT IT Services Innovation Smartphone Hardware Business Continuity Android Workplace Tips Encryption Cloud Computing Social Media Windows 10 Collaboration Paperless Office Communication Small Business Browser Data Management Office 365 Business Management Remote Monitoring Managed IT Services Server Disaster Recovery Bandwidth Windows 10 Government Save Money Smartphones App IT Management Cybersecurity Work/Life Balance Facebook Wi-Fi Healthcare Artificial Intelligence Unified Threat Management Phishing BDR Infrastructure Tip of the week Antivirus BYOD Vulnerability Managed Service Information Money Holiday Chromebook VoIP Virtual Reality Two-factor Authentication Maintenance Word Risk Management Politics Passwords How To Chrome Apps File Sharing Applications Document Management SaaS Customer Relationship Management Big Data Internet of Things Hosted Solution Office Network Compliance Scam Windows Password Upgrade Mobile Device Blockchain Employer-Employee Relationship Saving Money Remote Computing Wireless Regulations Point of Sale Storage How To Telephone Systems IoT Mobile Device Management G Suite VPN Quick Tips Data Security Business Technology Firewall Server Management Automation Computer Care Virtual Private Network Downtime Taxes HIPAA Alert Tech Support Health Mobile Security Training Websites Hacker Samsung Smart Technology Electronic Medical Records Meetings Physical Security Communications Twitter Botnet Computing Website Router Remote Monitoring and Management Patch Management Automobile Robot Vendor Management Remote Workers Machine Learning Identity Theft Recovery Gmail Data loss IT Solutions WiFi Specifications Zero-Day Threat Networking Sports Spam Computing Infrastructure Utility Computing Value Features Google Calendar Geography Instant Messaging Computer Repair Travel Permissions Uninterrupted Power Supply Servers Virtualization Relocation Cleaning Supercomputer Break Fix Cookies Fleet Tracking Operating System Network Management Printer Wearable Technology Managing Stress Help Desk YouTube Upgrades Processors GPS Black Friday Social Networking Backup and Disaster Recovery Search Alerts Electronic Health Records Managed IT Legislation Chatbots High-Speed Internet Finance Analytics Motion Sickness Financial Fraud Professional Services Star Wars Monitoring Private Cloud IT Budget Augmented Reality Dark Web Nanotechnology Asset Tracking Tech Terms IT Support Touchscreen Access Control Enterprise Content Management Bookmarks Settings Office Tips Tracking Cyber Monday Motherboard MSP Human Error Google Drive Web Server Licensing Management Cyberattacks Corporate Profile Outlook Mouse Identity Development Authentication Lenovo IBM USB Cost Management Consulting Solid State Drive Statistics Cortana Error Black Market Digital Mail Merge Crowdsourcing The Internet of Things Digital Payment Microsoft Excel Screen Reader OneNote Theft Cabling Emoji IT Consultant SharePoint Unified Communications Favorites Microsoft Office Proactive Permission VoIP Techology Gadgets Cameras Budget Cooperation Enterprise Resource Planning Files WannaCry Shortcut Staffing Tablet Cables Authorization Firefox Superfish Hotspot Dongle Assessment Managed Services Provider Hard Disk Drive Bluetooth Spyware Address Personal Information Cybercrime Smart Tech Employee-Employer Relationship Downloads IT Technicians Bring Your Own Device Project Management Administrator Distributed Denial of Service Test Avoiding Downtime Law Enforcement Update Users CCTV Unified Threat Management Staff Mobile Read Only Monitors Comparison Wires Employees Legal Webcam Customer Service Language Service Level Agreement Internet Exlporer E-Commerce Vulnerabilities Conferencing Connectivity Disaster Heating/Cooling Education Multi-Factor Security Mirgation Social Notifications Managed IT Service Modem WPA3 RMM Time Management Gadget User Error Company Culture Emergency Public Speaking Hard Drives Presentation Regulation Lithium-ion battery Wireless Technology 5G Procurement Safety Marketing Competition Hiring/Firing IP Address Miscellaneous Fun CrashOverride Mobile Office Domains Printers