301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Malware Hackers Software Email Network Security Tech Term Backup Mobile Devices Managed IT Services Business Internet Ransomware Computer Microsoft Hosted Solutions Productivity User Tips Google Smartphone Data Recovery Managed Service Provider Productivity Android Data Backup Efficiency IT Services Office 365 Encryption Business Continuity Small Business Cloud Computing IT Support Paperless Office Data Management Social Media Windows 10 Outsourced IT Remote Monitoring Hardware Data Business Management Browser Communication Workplace Tips Save Money App Tip of the week Infrastructure Smartphones Bandwidth Facebook Disaster Recovery Innovation Government BYOD Server Cybersecurity Work/Life Balance Chrome Windows 10 Internet of Things Compliance Holiday Hosted Solution Saving Money Vulnerability IT Management Unified Threat Management Two-factor Authentication Money Word Virtual Reality Applications Artificial Intelligence BDR Apps Risk Management How To Phishing SaaS Document Management Big Data Employer-Employee Relationship Antivirus Windows Managed IT Services Password File Sharing Chromebook Automobile Physical Security Hacker Alert Health Customer Relationship Management Office Samsung G Suite Blockchain Patch Management Gmail Computing Scam Vendor Management Regulations Data loss Taxes IoT Politics Mobile Device VPN Websites HIPAA Data Security Telephone Systems Server Management Virtual Private Network Botnet Mobile Security Tech Support Automation Firewall Smart Technology Collaboration Twitter Computer Care Storage Robot Recovery Training Identity Theft Remote Computing Maintenance Wi-Fi Business Technology Passwords Corporate Profile CCTV Screen Reader Law Enforcement Microsoft Excel Outlook Cooperation IBM Lenovo IT Budget Dongle Bring Your Own Device Tablet Cabling WannaCry Smart Tech Microsoft Office Gadget Shortcut Staff Emoji Superfish Firefox Digital Payment Service Level Agreement Vulnerabilities Travel Comparison Monitors Staffing Connectivity Website Electronic Medical Records Utility Computing Geography IT Solutions Motion Sickness Specifications Heating/Cooling Disaster Network Permissions Legal Wearable Technology Spam Networking Printer Healthcare Office Tips Uninterrupted Power Supply High-Speed Internet Upgrades Social Networking Mobile Device Management Notifications Black Friday Social Servers YouTube IT Consultant WiFi Star Wars Fraud Sports Access Control Quick Tips Management Development Meetings Motherboard Cyber Monday Settings GPS Cost Management Augmented Reality SharePoint Google Drive Enterprise Resource Planning Administrator Solid State Drive Cables Webcam Statistics Mail Merge Digital Education Tracking Assessment Machine Learning Hotspot The Internet of Things IT Technicians Budget Black Market Techology Downloads Gadgets VoIP Mobile Hard Disk Drive Wires Point of Sale Router Crowdsourcing Distributed Denial of Service Bluetooth Address Spyware Cleaning Internet Exlporer Relocation Language Mirgation Unified Threat Management Multi-Factor Security Avoiding Downtime Company Culture Modem Managed IT Service Personal Information Upgrade Update Value Private Cloud Computing Infrastructure Virtualization Downtime User Error Google Calendar Time Management Managing Stress Web Server Cookies Wireless Break Fix How To Professional Services Search Error Alerts Enterprise Content Management Chatbots VoIP Legislation Network Management Cameras Nanotechnology Dark Web Computer Repair Managed IT Licensing Analytics Supercomputer USB Communications Unified Communications Cortana Cybercrime Identity Processors Mouse Touchscreen IT Support 5G Wireless Technology Marketing IP Address Customer Service Mobile Office Domains Hard Drives Public Speaking Lithium-ion battery Safety Hiring/Firing Competition Fun Users Managed Service Miscellaneous CrashOverride Emergency Presentation