Get Started Today!  321-259-5500

croom new

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 321-259-5500.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Malware Hackers Business Computing Business Email Internet Hosted Solutions Productivity Backup Computer IT Services Mobile Devices Network Security Microsoft Software Managed Service Provider Windows 10 Ransomware Hardware Google Smartphone User Tips Data Android Business Continuity Workplace Tips Data Management Disaster Recovery Tech Term Innovation Efficiency IT Support Server App Small Business Managed IT Services Social Media Communication BYOD Encryption Browser Smartphones Internet of Things Office 365 Network Data Recovery Cloud Computing Business Management Facebook Productivity Gmail Big Data Windows Artificial Intelligence Phishing Paperless Office Employer-Employee Relationship Hosted Solution Office WiFi Apps Alert Upgrade Office Tips Wireless Technology Outsourced IT Miscellaneous Vendor Management Government Mobile Device Management Save Money Spam Remote Monitoring Robot Recovery Data Backup Risk Management Passwords Firewall Chrome Budget Saving Money IT solutions Hacker Cybersecurity Money Holiday Vulnerability Work/Life Balance Avoiding Downtime Infrastructure Tip of the week How To Wireless Microsoft Office Content Filtering Password Wi-Fi Word IT Support Two-factor Authentication Virtualization Tech Support Antivirus Automation Virtual Reality Data storage IT service VoIP Website SaaS Bandwidth Cybercrime Document Management Education Hard Drives Windows 10 Settings The Internet of Things Analytics Remote Computing Apple VPN Social Going Green Unified Threat Management Customer Service Twitter IT Management Computing Legal Applications Managed IT Services Training Virtual Desktop Monitors Mobile Security Machine Learning Presentation Maintenance Business Owner Samsung Telephone Systems Competition Augmented Reality User Best Practice eWaste Scam Outlook Heating/Cooling Network Management Patch Management Mobile Device Data loss Solid State Drive User Error Physical Security Mouse Collaboration Search Automobile Data Security Chromebook Storage Identity Theft Virtual Private Network Administration File Sharing Lithium-ion battery G Suite Hacking Safety Compliance IBM Business Intelligence Taxes Regulations Downtime Cost Management Computers communications Cortana Customer Relationship Management Router End of Support Running Cable Server Management Blockchain YouTube Politics Health Unified Communications Bring Your Own Device Upgrades Tablet Printing Websites HIPAA LiFi Computer Care Sports BDR Botnet Business Technology Google Drive Alt Codes Marketing Nanotechnology Quick Tips Managed IT Service Unsupported Software Google Maps Information Technology Management Lenovo IT Technicians Google Docs Downloads Deep Learning Point of Sale Staffing Typing Buisness Screen Reader VoIP Break Fix Mobile Data Hotspot Entrepreneur Google Wallet Co-managed IT Relocation Company Culture Superfish Mirgation Corporate Profile Multi-Factor Security Web Server GPS Cryptocurrency Trending Notifications Smart Tech Time Management Writing Dark Web Shortcut Language Drones Fun Private Cloud Managing Stress Application Chatbots WannaCry Google Calendar Identities Cameras Tracking Bitcoin CIO Crowdsourcing Connectivity Retail Net Neutrality Computing Infrastructure Environment Administrator Error Enterprise Content Management Networking Update Identity Humor Legislation CCTV Mobile Computing Windows 8 IP Address IoT Touchscreen Social Engineering FCC Alerts Cabling Vulnerabilities Public Speaking Digital Comparison iPhone Hacks Mobile Office Star Wars Title II Refrigeration Licensing Save Time Troubleshooting Development Gadgets Techology Emoji Social Networking Spyware Dark Data Specifications Supercomputer Law Enforcement Assessment Online Cables Mail Merge Personal Information Cooperation Disaster Backups Travel Hiring/Firing Laptop Users Unified Threat Management Motherboard Black Friday Servers Microsoft Excel IT Budget Current Events Gadget Internet Exlporer Wires Address Computer Repair Staff Uninterrupted Power Supply Motion Sickness IT Consultant Halloween Printer Black Market How To Cyber Monday Digital Payment Hard Drive Wearable Technology Hard Disk Drive Cleaning Scary Stories Access Control Modem Firefox Network Congestion Smart Technology Statistics Permissions Cache Law Undo Electronic Medical Records Operating System Meetings Knowledge Analyitcs Business Growth SharePoint Processors Cookies Display Distributed Denial of Service Bluetooth 3D Printing Fraud 5G Recycling Managed IT Webcam Experience Help Desk Flexibility Domains USB CrashOverride Emergency

      Latest Blog Entry

      Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuf...

      Account Login