301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Business Network Security Email Software Tech Term Hosted Solutions Internet IT Support Data Backup Data Data Recovery Computer Google User Tips Efficiency Mobile Devices IT Services Ransomware Innovation Backup Managed IT Services Microsoft Cloud Computing Hardware Business Management Small Business Productivity Outsourced IT Workplace Tips Smartphone Encryption Business Continuity Managed IT Services Managed Service Provider Collaboration Android Paperless Office Remote Monitoring Phishing Windows 10 Office 365 Server Upgrade Social Media Communication Browser Communications Data Management Smartphones Disaster Recovery Save Money Windows 10 Employer-Employee Relationship Bandwidth VoIP Cybersecurity Holiday Passwords Government Healthcare Apps Artificial Intelligence Chrome BYOD Unified Threat Management BDR Document Management Work/Life Balance Facebook Infrastructure Tip of the week Internet of Things Saving Money Automation Scam Antivirus Compliance Windows Risk Management Vulnerability IT Management App Wi-Fi Managed Service Information Quick Tips Business Technology Hosted Solution Office Politics Password Microsoft Office File Sharing Customer Relationship Management Applications Money Big Data Chromebook Virtual Reality Vendor Management Network How To Blockchain Mobile Device SaaS VPN Two-factor Authentication Maintenance Analytics Word Computer Care Settings Virtual Private Network Firewall Tech Support Private Cloud Downtime Professional Services Robot Access Control HIPAA Taxes Hacker Training Recovery Mobile Security Management Social Remote Computing Websites Smart Technology Proactive Website Meetings Tablet Patch Management Botnet Router Bring Your Own Device Automobile Remote Monitoring and Management Data loss Wireless Alert Machine Learning Employees Mobile Device Management Identity Theft Remote Workers Networking Gmail Health Regulations How To Point of Sale Company Culture IoT Telephone Systems Samsung Storage Physical Security Twitter Data Security G Suite Electronic Medical Records Computing Server Management Backup and Disaster Recovery Update Fraud Star Wars Motion Sickness Electronic Health Records IT Support Touchscreen Net Neutrality Legislation Chatbots Corporate Profile Outlook Dark Web Nanotechnology IT Budget Monitoring Google Drive Virtual Assistant IBM High-Speed Internet Finance Legal Cyber Monday Motherboard Office Tips Tracking Asset Tracking Tech Terms Printing Lenovo The Internet of Things Licensing Web Server Enterprise Content Management Bookmarks Solid State Drive Statistics Error MSP Human Error Digital Mail Merge Cost Management Cyberattacks Notifications Cabling Windows 7 Gadgets Mouse Budget Identity WannaCry Shortcut Microsoft Excel Screen Reader USB Digital Payment Consulting IT Solutions VoIP Software as a Service Techology SharePoint IT Consultant Development Authentication Sports OneNote Virtualization Theft Firefox Remote Worker Superfish Cooperation Cameras Unified Communications Favorites Computer Repair Hard Disk Drive Bluetooth Staffing Permission Spyware Address Hotspot Assessment Enterprise Resource Planning Files Users Monitors Smart Tech Cybercrime Dongle Managed Services Provider Upgrades Processors Avoiding Downtime Wasting Time Downloads Customer Service IT Technicians Cables Search Authorization Distributed Denial of Service Administrator Employee-Employer Relationship ROI Unified Threat Management Staff Law Enforcement CCTV Project Management Comparison Test Financial Language Internet Exlporer Webcam Mobile Read Only Disaster Heating/Cooling Connectivity Service Level Agreement E-Commerce Time Management Database Multi-Factor Security Spam Mirgation Education Wires Managed IT Service Modem Cortana Black Market Notes User Error Gadget Vulnerabilities Conferencing Specifications WiFi WPA3 RMM Emoji Procurement Computing Infrastructure Value Crowdsourcing Uninterrupted Power Supply Servers Zero-Day Threat YouTube Permissions Travel Utility Computing Features Network Management Voice over Internet Protocol Google Calendar Relocation Cleaning Managed IT Break Fix Cookies Supercomputer PowerPoint Printer Wearable Technology Geography Instant Messaging Black Friday Social Networking GPS Fleet Tracking Operating System Security Cameras Alerts Augmented Reality Managing Stress Help Desk Personal Information Regulation Wireless Technology 5G Safety Fun Marketing Competition IP Address Hard Drives Transportation Miscellaneous Mobile Office CrashOverride Domains Emergency Public Speaking Printers Presentation Lithium-ion battery Hiring/Firing