301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 301-571-5040.

Cloud Can Cover Most of Your Business Needs
Some Providers are Offering Blockchain as a Servic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Email Hackers Tech Term Software Network Security Business Internet Productivity Computer Hosted Solutions Mobile Devices Backup Managed IT Services Ransomware Microsoft Data IT Support User Tips Google Data Backup Productivity Data Recovery IT Services Smartphone Efficiency Managed Service Provider Android Workplace Tips Innovation Encryption Cloud Computing Outsourced IT Business Management Communication Small Business Paperless Office Business Continuity Browser Office 365 Social Media Data Management Hardware Windows 10 Save Money Government Remote Monitoring Collaboration Disaster Recovery Cybersecurity App Infrastructure Tip of the week BYOD Work/Life Balance Facebook Unified Threat Management Phishing Server Bandwidth Smartphones Artificial Intelligence Windows 10 Mobile Device VoIP Managed Service Wi-Fi Hosted Solution Two-factor Authentication Office Employer-Employee Relationship Password Applications Passwords Antivirus BDR Holiday Healthcare Apps Vulnerability Money Internet of Things Managed IT Services Chromebook Politics IT Management Virtual Reality Compliance Customer Relationship Management Big Data Risk Management File Sharing How To Document Management Word Saving Money SaaS Chrome Windows Network Computing Machine Learning HIPAA Identity Theft Point of Sale Information Robot Mobile Security Telephone Systems Patch Management Recovery Smart Technology G Suite Vendor Management Scam Tech Support Remote Computing Hacker Firewall Data loss Computer Care Router Taxes How To VPN Automation Blockchain Training Maintenance Website Websites Quick Tips Data Security Gmail Server Management Regulations Business Technology Alert Storage Meetings Virtual Private Network IoT Health Botnet Samsung Remote Workers Physical Security Twitter Automobile WannaCry Shortcut WPA3 Dark Web Nanotechnology Education VoIP Company Culture Techology Personal Information Access Control Hard Disk Drive Bluetooth Update Cyber Monday Motherboard Gadget Firefox Utility Computing Superfish Features Licensing Legal Mouse Identity Spyware Address Cost Management WiFi Geography Instant Messaging Travel Monitors Fleet Tracking Microsoft Excel Screen Reader Augmented Reality Relocation Cleaning Avoiding Downtime Managing Stress Help Desk SharePoint Electronic Health Records Social Notifications Cooperation Supercomputer Sports Tablet Professional Services Monitoring IT Solutions Hotspot Assessment IBM GPS Disaster Heating/Cooling High-Speed Internet Motion Sickness Asset Tracking Virtualization Smart Tech The Internet of Things Private Cloud Time Management Enterprise Content Management Bookmarks Computer Repair Downloads IT Technicians MSP Distributed Denial of Service Microsoft Office Management Networking Cyberattacks Unified Threat Management Staff Gadgets Budget Downtime IT Budget Search Comparison Web Server USB Consulting Upgrades Processors Language Internet Exlporer Office Tips Tracking Uninterrupted Power Supply Servers Development YouTube OneNote Connectivity Error Network Management Unified Communications Favorites Multi-Factor Security Mirgation Digital Payment Managed IT Proactive Managed IT Service Modem IT Consultant Enterprise Resource Planning Files User Error Cables Specifications Cameras Analytics Dongle Managed Services Provider Computing Infrastructure Value Settings Employee-Employer Relationship Cortana Black Market Permissions Upgrade Communications Staffing IT Support Touchscreen Bring Your Own Device Project Management Google Calendar Cybercrime Corporate Profile Outlook Remote Monitoring and Management Emoji Break Fix Cookies Google Drive Mobile Read Only Printer Crowdsourcing Wearable Technology Solid State Drive Statistics Wires Black Friday Social Networking Wireless Law Enforcement CCTV Service Level Agreement Lenovo E-Commerce Alerts Spam Administrator Electronic Medical Records Legislation Chatbots Mobile Device Management Webcam Digital Mail Merge Fraud Star Wars Cabling Vulnerabilities Conferencing Hiring/Firing Public Speaking Printers Presentation Fun Lithium-ion battery Regulation Wireless Technology 5G Safety CrashOverride Finance Marketing Hard Drives Competition Emergency IP Address Users Miscellaneous Customer Service Mobile Office Domains