301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Computing Malware Software Hackers Email Network Security Tech Term Business Managed IT Services Backup Mobile Devices Internet Microsoft Computer Ransomware Hosted Solutions Productivity User Tips IT Support Google Data Productivity IT Services Smartphone Data Recovery Efficiency Managed Service Provider Android Data Backup Cloud Computing Communication Data Management Small Business Office 365 Paperless Office Social Media Windows 10 Hardware Encryption Business Continuity Outsourced IT Business Management Browser Innovation Remote Monitoring Workplace Tips Server Disaster Recovery Bandwidth Save Money App Cybersecurity Government Infrastructure Tip of the week BYOD Smartphones Unified Threat Management Work/Life Balance Facebook Virtual Reality Applications Word Passwords BDR Risk Management How To Windows Apps Artificial Intelligence Internet of Things Chrome Windows 10 Compliance SaaS Big Data Collaboration Holiday Hosted Solution Antivirus Saving Money Password Employer-Employee Relationship Vulnerability Managed Service Managed IT Services Phishing IT Management File Sharing Money Wi-Fi Chromebook Document Management Two-factor Authentication Maintenance Mobile Security Quick Tips Data Security Botnet Server Management Automation Business Technology Smart Technology Tech Support Virtual Private Network Automobile Network Alert Health Mobile Device Hacker Router Identity Theft Customer Relationship Management Samsung Blockchain Physical Security Twitter Telephone Systems G Suite Computing Gmail Regulations Patch Management Storage Computer Care IoT Office Robot Firewall Vendor Management Scam Politics Taxes Recovery Data loss Training Remote Computing Websites VoIP How To HIPAA VPN Mouse Identity Search Communications Staffing Managed IT High-Speed Internet Cost Management Upgrades Meetings Processors Professional Services Augmented Reality Enterprise Content Management Microsoft Excel Screen Reader Cybercrime Analytics Asset Tracking SharePoint IT Support Touchscreen Management Administrator Settings MSP Cooperation Law Enforcement CCTV USB Tablet IBM Corporate Profile Outlook Development Hotspot Assessment Webcam Google Drive Downloads IT Technicians Machine Learning Education The Internet of Things Solid State Drive Statistics Unified Communications Smart Tech Cortana Black Market Lenovo OneNote Microsoft Office Cabling Enterprise Resource Planning Distributed Denial of Service Emoji Gadgets Budget Digital Mail Merge Proactive Unified Threat Management Staff Gadget Crowdsourcing Techology Dongle Comparison WiFi WannaCry Shortcut Cables Language Internet Exlporer Point of Sale VoIP Multi-Factor Security Mirgation Relocation Electronic Medical Records Cleaning Hard Disk Drive Bluetooth Bring Your Own Device Connectivity Travel Firefox Superfish Employee-Employer Relationship Website Mobile Managed IT Service Modem Supercomputer Spyware Address Remote Monitoring and Management User Error Personal Information Avoiding Downtime Service Level Agreement Specifications Update GPS Monitors Wires Computing Infrastructure Value Google Calendar Private Cloud Legal Upgrade Vulnerabilities Permissions Motion Sickness Remote Workers Disaster Heating/Cooling Company Culture Break Fix Cookies Downtime IT Budget WPA3 Printer Wearable Technology Wireless Time Management Utility Computing Black Friday Social Networking Office Tips Tracking Spam Alerts Social Web Server Notifications Legislation Chatbots Error Sports Geography Fraud Star Wars IT Solutions Mobile Device Management Networking Information Computer Repair IT Consultant Uninterrupted Power Supply Servers Managing Stress Dark Web Nanotechnology Virtualization Digital Payment Fleet Tracking Access Control Network Management Healthcare Cyber Monday Motherboard YouTube Licensing Cameras Monitoring Lithium-ion battery Wireless Technology 5G Safety Marketing Competition IP Address Hiring/Firing Users Customer Service Miscellaneous Fun Mobile Office Domains CrashOverride Public Speaking Emergency Presentation Hard Drives Regulation