Login 

SolutionOne Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in Technology

Tech Term: Protocol

b2ap3_thumbnail_tt_protocol_400.jpgComputers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 214-299-8555.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 20 September 2018

Categories

Tag Cloud

Consulting Managed IT Storage Entrepreneur Web Marketing Bring Your Own Device Uninterrupted Power Supply Microsoft Processors Screen Reader Upgrades Facebook Smartphones Collaboration Virtualization Employer-Employee Relationship iPhones Memory Development Scam Assessment Motherboard Running Cable Superfish Text Messaging Marketing BYOD Password IT budget Applications Leadership Best Practice Social Media App eBay Black Market Company Culture WannaCry Windows 8 Digital Payment Ransomware Tablet Monitoring , Privacy, security Gaming Console Start Menu IT Services Gadgets Artificial Intelligence Current Events WiFi Tip of the Week Tracking Windows 10 BDR Websites Distributed Denial of Service Customer Relationship Management Multi-Factor Security Machine Learning Crowdsourcing Legal Cabling G Suite Best Practices LiFi User Tips Business Growth Data loss Google Analytics Language Virtual Reality 5G Point of Sale Automation Workplace Tips Telephone Systems Personal Information Disaster Recovery Computer Care Content Filtering Address Piracy Government Features VPN Tech Support Apps Access Control Phone System Debate Hacking Conferencing Computer Repair Fun LinkedIn File Sharing Supercomputer Mobile Data Fraud Undo Health Politics Scheduling PowerPoint Internet Halloween Google Docs Licensing Tutorials Browser Black Friday Time Management IT Consultant Privacy Office 365 Remote Workers Chatbots Technolog Competition CCTV Router Website Comparison Unified Threat Management Best Available Data recovery Virtual Desktop Laptop Downtime Efficiency Environment Experience Quick Tips Social Net Neutrality Vendor Management Chrome Typing Inbound Marketing Email Webinar Programming Saving Time Remote Monitoring Recovery Law Enforcement Writing Notifications Cookies Analyitcs Chromebook Data Management Cache The Internet of Things Augmented Reality Mail Merge Phishing Going Green Digital Dark Web Mobile Office Excel Android Motion sickness Hardware Innovation Thank You Google Wallet Save Money Mobile Devices 3D Antivirus Wires SharePoint Domains Security Hard Disk Drive Software Identity Theft Cameras Lenovo Cables Trending Botnet Online Currency Outlook Infrastructure Twitter Display Networking Cybercrime Mobile Customer Service IT service User Printing Social Engineering Alert Budget Physical Security Cloud Computing Hiring/Firing Sports User Error People Microsoft Excel Computers virtual private network Hard Drive Private Cloud Vulnerability Google Drive Touchscreen Save Time Dark Data Legislation Hackers Streaming Media Windows 8.1 Update Education Tools staff Samsung USB Holiday Electronic Medical Records Business Computing Hard Drives Travel Network Management Tech Term IP Address IT Technicians Safety DIY Mobile Computing Cybersecurity Network Security Retail Monitors 3D Printing Business Intelligence Encryption Risk Management Data Regulations Paperless Office Hosted Solution Refrigeration Phone Systems Specifications Video Surveillance Mouse Users Upgrade Servers Monitoring Windows Application Two-factor Authentication Service-based Business Deep Learning Tip of the Work cooperation Corporate Profile Data Security eWaste Nanotechnology Spam Saving Money IT Solutions vulnerabilities Money Smart Technology Skype IT Management Word Secruity Mobile Security Bluetooth History Business Technology Lithium-ion Battery Microsoft Office Work/Life Balance Cloud Identity Firewall IT Support Avoiding Downtime Taxes Presentation Wireless Unsupported Software Patch Management Cost Management Computer Accessories Network Congestion Computing Infrastructure Google Maps Wearable Technology Modem Business Continuity Busienss Computing Network Administration Gadget User Tip Backup Business Management IBM Office Internet Exlporer Emoji Apple Congratulations Shortcut Settings Unified Communications End of Support Document Management Troubleshooting Enterprise Content Management VoIP MSP Meetings Files Data storage Miscellaneous Operating System Trainging Cleaning CrashOverride Search Macro Automobile Webcam Law Firm IT Managed Service Provider Web Server Cyber Monday Managed IT services Small Business Productivity Hacker HIPAA Downloads Office Tips Migration Managing Stress Outsourcing Humor Knowledge Read Only Scary Stories Compliance Help Desk Battery GPS How To SaaS Virus Software Tips Mobile Device Management Cryptocurrency Public Speaking Disaster Healthcare Business Electronic Health Records Training Drones E-Commerce Wireless Technology Business Owner Hosted Solutions Alerts Buisness YouTube Hotspot Internet of Things Permissions Recycling Emergency Data Backup Information Computer Computing Mobile Technology Outsourced IT Printer Maintenance Error Technology Connectivity Staffing Administrator Relocation Big Data Robot Smartphone communications Wi-Fi IoT Charger Consumers Cortana Break Fix Blockchain Firefox Remote Computing Food iPhone Bitcoin Mobile Device Solid State Drive Heating/Cooling Star Wars Malware Social Networking Proactive IT Bandwidth managed services provider Communication Passwords Google Calendar Managed Service Spyware Server Management Alt Codes Hacks Information Technology Statistics Smart Tech Gmail Management Server Fax Server PC Care Crowdfunding

Latest Blog Entry

Tech Term: Read Only
You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance be...
Read more...

Latest News

Book Your Domain Name


webSolutionOne Launches New Domain Registration Site

Find your perfect domain name in minutes with our name suggestion tool.  Visit www.s1host.com to get started!

 

Contact Us

Learn more about what SolutionOne can do for your business.

callphone

Call us today    214-299-8555

  facebook  twitter  linkedin Subscribe to our blog