301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Business Email Network Security Software Hosted Solutions Tech Term Internet Data Computer Data Backup Mobile Devices IT Support Data Recovery Innovation Backup User Tips Efficiency Ransomware Managed IT Services IT Services Google Cloud Computing Microsoft Business Management Workplace Tips Hardware Outsourced IT Small Business Productivity Android Paperless Office Managed Service Provider Encryption Smartphone Business Continuity Office 365 Social Media Windows 10 Remote Monitoring Collaboration Server Upgrade Smartphones Phishing Windows 10 Data Management Communication Save Money Managed IT Services Browser Disaster Recovery Bandwidth VoIP Government Communications Employer-Employee Relationship Cybersecurity Holiday Automation Quick Tips Risk Management Business Technology Saving Money Artificial Intelligence Unified Threat Management BDR Document Management Managed Service Internet of Things Wi-Fi Information Infrastructure Tip of the week Passwords Compliance Healthcare Windows BYOD Scam Antivirus Apps App Work/Life Balance Vulnerability IT Management Facebook VPN Maintenance Word Politics How To Applications Chrome File Sharing SaaS Two-factor Authentication Hosted Solution Office Network Password Blockchain Vendor Management Mobile Device Microsoft Office Money Customer Relationship Management Chromebook Big Data Virtual Reality Website Data Security Access Control HIPAA Firewall Private Cloud Computer Care Analytics Downtime Alert Bring Your Own Device Server Management Taxes Virtual Private Network Mobile Security Health Remote Monitoring and Management Employees Wireless Training Samsung Smart Technology Mobile Device Management Websites Remote Workers Physical Security Twitter Company Culture Tablet Electronic Medical Records Computing Meetings Router Botnet Robot Automobile Tech Support Patch Management Gmail Social Machine Learning Recovery Professional Services Identity Theft Remote Computing Hacker Regulations IoT Management Storage Point of Sale Data loss Telephone Systems How To G Suite Fraud Star Wars GPS Database Enterprise Resource Planning Files Network Management Users Legislation Chatbots Proactive Permission YouTube Dongle Managed Services Provider Customer Service Motion Sickness Cables Authorization Managed IT Dark Web Nanotechnology Notes Licensing IT Budget Project Management Cyber Monday Motherboard Procurement Employee-Employer Relationship Settings Cost Management Office Tips Tracking Cortana Voice over Internet Protocol Black Market Mobile Read Only IT Support Touchscreen Mouse Identity Web Server Test Service Level Agreement E-Commerce Google Drive SharePoint Spam Crowdsourcing Wires Corporate Profile Outlook Microsoft Excel Screen Reader Error PowerPoint Emoji Lenovo Cooperation Digital Payment Vulnerabilities Conferencing Solid State Drive Statistics IT Consultant Security Cameras Digital Mail Merge Hotspot Assessment Net Neutrality Cabling Cameras WPA3 RMM Staffing Virtual Assistant Utility Computing Features VoIP Techology Downloads IT Technicians Personal Information Zero-Day Threat WannaCry Shortcut Smart Tech Firefox Superfish Unified Threat Management Staff Cybercrime Geography Instant Messaging Hard Disk Drive Bluetooth Distributed Denial of Service Printing Update Spyware Address Language Augmented Reality Internet Exlporer Administrator Windows 7 Managing Stress Help Desk Comparison Law Enforcement CCTV Legal Fleet Tracking Operating System Software as a Service Electronic Health Records Avoiding Downtime Multi-Factor Security Mirgation Webcam Backup and Disaster Recovery Monitors Connectivity User Error IBM Notifications High-Speed Internet Finance Managed IT Service Modem Education Remote Worker Monitoring The Internet of Things Computing Infrastructure Value IT Solutions Enterprise Content Management Bookmarks Disaster Heating/Cooling Specifications Gadget Sports Asset Tracking Tech Terms Permissions WiFi Virtualization Wasting Time Cyberattacks Time Management Gadgets Google Calendar Budget Computer Repair MSP Human Error USB Consulting Networking Printer Wearable Technology Travel Development Authentication Break Fix Cookies Relocation Cleaning ROI Alerts Supercomputer Upgrades Processors Unified Communications Favorites Uninterrupted Power Supply Servers Black Friday Social Networking Search Financial OneNote Theft Miscellaneous Mobile Office Domains Public Speaking Printers Hiring/Firing Presentation Lithium-ion battery Fun Regulation Wireless Technology 5G Safety CrashOverride Marketing Competition Hard Drives Emergency IP Address