301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Hackers Productivity Business Network Security Email Software Tech Term Internet Hosted Solutions Mobile Devices Computer Data Data Backup Backup Ransomware Managed IT Services User Tips Google Microsoft IT Support Data Recovery Hardware Efficiency Productivity Outsourced IT Innovation Small Business Managed Service Provider Cloud Computing IT Services Smartphone Business Management Social Media Business Continuity Android Workplace Tips Paperless Office Encryption Remote Monitoring Save Money Smartphones Windows 10 Collaboration Windows 10 Communication Browser Managed IT Services Data Management Office 365 Holiday Server Disaster Recovery Bandwidth Government App Work/Life Balance Cybersecurity Facebook Artificial Intelligence Healthcare VoIP Wi-Fi Passwords Infrastructure Tip of the week Unified Threat Management Phishing BDR Antivirus Scam Communications Internet of Things Vulnerability IT Management BYOD Employer-Employee Relationship Blockchain Mobile Device Maintenance Upgrade Quick Tips Saving Money Word Managed Service Money Information Chromebook Virtual Reality Chrome Risk Management Two-factor Authentication Politics How To Apps File Sharing SaaS Applications Document Management Hosted Solution Customer Relationship Management Office Big Data Compliance Password Network Windows Machine Learning Social VPN Remote Workers Recovery Remote Computing Identity Theft Gmail Company Culture Data Security Regulations Server Management Business Technology Point of Sale Wireless IoT Virtual Private Network Telephone Systems Storage Mobile Device Management G Suite Automation Private Cloud Computer Care Firewall Taxes Alert Downtime Access Control HIPAA Health Training Mobile Security Tech Support Websites Samsung Patch Management Twitter Smart Technology Electronic Medical Records Vendor Management Hacker Physical Security Microsoft Office Meetings Computing Botnet Data loss Robot Router Remote Monitoring and Management Employees Website Automobile How To Education Notifications Connectivity YouTube Customer Service Multi-Factor Security Mirgation Network Management Vulnerabilities Conferencing Gadget IT Solutions ROI Managed IT Service Modem Managed IT WPA3 RMM Sports User Error Financial Specifications Zero-Day Threat Computer Repair WiFi Computing Infrastructure Value Analytics Utility Computing Features Virtualization Instant Messaging Relocation Cleaning Permissions Settings Spam Travel Google Calendar IT Support Touchscreen Geography Upgrades Processors Break Fix Cookies Corporate Profile Outlook Fleet Tracking Operating System Search Supercomputer Printer Wearable Technology Google Drive Managing Stress Help Desk Procurement Black Friday Social Networking Solid State Drive Statistics Backup and Disaster Recovery GPS Alerts Lenovo Electronic Health Records Cabling High-Speed Internet Finance Fraud Star Wars Digital Professional Services Mail Merge Monitoring Motion Sickness Legislation Chatbots Dark Web Nanotechnology WannaCry Shortcut Asset Tracking Tech Terms IT Budget VoIP Enterprise Content Management Techology Bookmarks Security Cameras Cyber Monday Motherboard Hard Disk Drive Bluetooth MSP Human Error Augmented Reality Office Tips Tracking Licensing Firefox Management Superfish Cyberattacks Cortana Web Server Black Market Identity Development Authentication Error Crowdsourcing Cost Management Spyware USB Address Consulting Emoji Mouse IT Consultant Microsoft Excel Screen Reader Monitors OneNote Theft IBM Digital Payment SharePoint Avoiding Downtime Unified Communications Favorites Cameras Printing Proactive Permission The Internet of Things Cooperation Enterprise Resource Planning Files Tablet Disaster Heating/Cooling Cables Authorization Personal Information Staffing Hotspot Assessment Dongle Managed Services Provider Gadgets Budget Smart Tech Employee-Employer Relationship Cybercrime Update Downloads IT Technicians Time Management Bring Your Own Device Project Management Law Enforcement CCTV Remote Worker Distributed Denial of Service Test Administrator Legal Unified Threat Management Staff Mobile Networking Read Only Comparison Uninterrupted Power Supply Servers Wires Language Internet Exlporer Service Level Agreement E-Commerce Users Webcam Miscellaneous Mobile Office Printers Domains Hard Drives Regulation Public Speaking Presentation Lithium-ion battery Wireless Technology 5G Safety Marketing CrashOverride Hiring/Firing Competition Fun IP Address Emergency