301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, September 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Malware Email Hackers Software Tech Term Business Network Security Internet Backup Mobile Devices Managed IT Services Computer Hosted Solutions IT Support User Tips Ransomware Microsoft Data Google Productivity Productivity Data Backup IT Services Smartphone Data Recovery Android Cloud Computing Outsourced IT Workplace Tips Efficiency Managed Service Provider Paperless Office Office 365 Innovation Social Media Windows 10 Encryption Hardware Business Continuity Data Management Communication Small Business Remote Monitoring Disaster Recovery Save Money Business Management Browser Government Smartphones BYOD Unified Threat Management Phishing Work/Life Balance Facebook Artificial Intelligence Server Bandwidth App Cybersecurity Infrastructure Tip of the week Big Data Compliance Antivirus Hosted Solution Saving Money Vulnerability Password IT Management Employer-Employee Relationship Managed IT Services File Sharing Document Management VoIP Money Wi-Fi Two-factor Authentication Chromebook Word Virtual Reality Network Passwords Windows Risk Management Chrome Applications Managed Service How To Windows 10 Apps BDR Internet of Things Healthcare Holiday SaaS Collaboration Physical Security Twitter Patch Management Website Blockchain Vendor Management Scam Computer Care Computing Firewall Politics Taxes Gmail Office Regulations Robot Data loss IoT Training Storage How To Websites Recovery Remote Computing VPN Quick Tips Data Security Maintenance Business Technology Botnet HIPAA Server Management Virtual Private Network Mobile Security Automobile Automation Machine Learning Tech Support Mobile Device Information Identity Theft Smart Technology Alert Health Hacker Point of Sale Telephone Systems G Suite Customer Relationship Management Router Samsung Asset Tracking Language Electronic Medical Records Internet Exlporer Avoiding Downtime GPS Enterprise Content Management Comparison Monitors Personal Information Connectivity Private Cloud Management Cyberattacks Multi-Factor Security Mirgation Motion Sickness MSP Modem USB Consulting User Error Update Disaster Heating/Cooling Downtime IT Budget Development Managed IT Service OneNote Upgrade Computing Infrastructure Legal Value Time Management Office Tips Tracking Unified Communications Specifications Web Server Permissions Networking Error Enterprise Resource Planning Files Google Calendar Proactive Break Fix Social Wireless Cookies Notifications IT Consultant Dongle Managed Services Provider Printer Spam Wearable Technology Uninterrupted Power Supply Servers Digital Payment Cables Employee-Employer Relationship Alerts Sports Network Management Bring Your Own Device Black Friday IT Solutions Mobile Device Management Social Networking YouTube Cameras Fraud Computer Repair Star Wars Communications Staffing Mobile Read Only Legislation Virtualization Chatbots Managed IT Meetings Remote Monitoring and Management Dark Web Nanotechnology Analytics Service Level Agreement E-Commerce Access Control Cybercrime Wires CCTV Remote Workers Search Licensing IT Support Touchscreen Administrator Vulnerabilities Cyber Monday Upgrades Motherboard Processors Settings Law Enforcement WPA3 Augmented Reality Cost Management Google Drive Company Culture Mouse Identity Corporate Profile Outlook Webcam Microsoft Excel Screen Reader Lenovo Education Utility Computing Features SharePoint Solid State Drive Statistics Mail Merge Gadget IBM Cooperation Cabling Geography Digital Fleet Tracking The Internet of Things Hotspot Assessment VoIP Techology WiFi Managing Stress Help Desk Tablet Cortana Black Market WannaCry Shortcut Microsoft Office Smart Tech Crowdsourcing Firefox Superfish Relocation Cleaning Electronic Health Records Gadgets Downloads Budget IT Technicians Emoji Hard Disk Drive Bluetooth Travel Spyware Address Professional Services Monitoring Unified Threat Management Staff Supercomputer High-Speed Internet Distributed Denial of Service IP Address Users Hiring/Firing Miscellaneous CrashOverride Customer Service Fun Mobile Office Domains Emergency Public Speaking Presentation Hard Drives Lithium-ion battery Printers Wireless Technology 5G Safety Marketing Regulation Competition