Login 

SolutionOne Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in Technology

Tech Term: Protocol

b2ap3_thumbnail_tt_protocol_400.jpgComputers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 214-299-8555.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 19 July 2018

Categories

Tag Cloud

Managed Service Provider Maintenance Hosted Solutions Mobile Devices WiFi Tracking Mobile Computing Budget G Suite Administration eBay Virtualization Mobile Security Migration Upgrades Cloud Computing Computing Language Social Engineering Small Business Private Cloud Scheduling Processors Specifications staff Dark Web Leadership Applications Unified Threat Management Cabling Web Server Application Memory Training Mail Merge Business Continuity Presentation Analytics HIPAA Recycling Sports Licensing Two-factor Authentication Browser Cryptocurrency Office Downloads Remote Monitoring Mobile Data Windows 10 Smartphones Cost Management Automation Firefox Best Available Alt Codes Paperless Office Hackers Communication Managed IT services Spyware Server Management Hacker Outlook Fraud Uninterrupted Power Supply Consumers Thank You Trainging Cybercrime Managed IT Network Congestion Upgrade Apple Quick Tips Robot Hard Disk Drive Electronic Medical Records Politics Router Online Currency The Internet of Things Work/Life Balance Display Information Technology Debate Saving Money Secruity Wireless Apps Malware Crowdfunding Network Security Going Green Experience Telephone Systems Touchscreen Artificial Intelligence Troubleshooting Mobile Technology Websites Cache Excel Cleaning Entrepreneur Undo People Fax Server Bring Your Own Device Proactive IT Microsoft Data recovery Money Tech Support Lithium-ion Battery IT Management IT budget Legislation File Sharing Blockchain End of Support BDR Google Maps Office 365 Vendor Management Data storage Virtual Reality Fun Compliance Mobile Computer Care Business Typing Internet of Things Network Management Macro GPS Solid State Drive BYOD Conferencing Computer Mobile Office Patch Management Office Tips USB Law Firm IT Travel Scary Stories Statistics LinkedIn Facebook cooperation Encryption Miscellaneous Time Management Augmented Reality Smart Tech IBM DIY Computer Repair Government Law Enforcement Humor Identity Inbound Marketing Data Security Data Management Error Address Chatbots Development Safety Webinar Personal Information Tablet IT Support Data loss Social Media IT Solutions Big Data Server iPhone 5G Customer Relationship Management Domains Current Events Printing Privacy Buisness Relocation CrashOverride Company Culture Tools Internet Firewall Business Computing Motion sickness Samsung Scam User Access Control Cyber Monday Phone System Wireless Technology Heating/Cooling Congratulations Operating System Taxes SaaS Video Surveillance Computer Accessories Supercomputer eWaste Passwords Windows Education Website Security Monitors Laptop Disaster Business Management Notifications Best Practice Black Market Management Chromebook Infrastructure Cortana WannaCry Customer Service Employer-Employee Relationship Avoiding Downtime Cloud Disaster Recovery Shortcut CCTV Comparison Battery Black Friday Drones Recovery Software Tips Writing 3D Printing Smartphone Knowledge IP Address Google Mobile Device Digital Payment Bandwidth Google Drive Gaming Console IT Services Risk Management Emergency Save Time Workplace Tips Saving Time Star Wars Environment Emoji Hosted Solution Alert PowerPoint Internet Exlporer Digital Mobile Device Management Social Networking Word Google Wallet Dark Data Refrigeration Outsourcing Technology Email Piracy Hard Drive IoT Windows 8.1 Update virtual private network Retail Data Backup Alerts Motherboard Wires Phone Systems Business Owner VPN Hacking Programming Antivirus Google Calendar Analyitcs Twitter History User Tips Password 3D YouTube Administrator Marketing Business Intelligence Search User Error Microsoft Excel Hard Drives Machine Learning Spam Android Business Technology Service-based Business Microsoft Office Cookies Running Cable Tip of the Work Tip of the Week Wearable Technology Content Filtering Innovation Users Corporate Profile Assessment Computing Infrastructure Computers Data Net Neutrality Lenovo Outsourced IT User Tip Enterprise Content Management Superfish Botnet MSP Permissions PC Care LiFi Streaming Media Web Marketing Gmail Software Text Messaging Mouse Identity Theft Help Desk Break Fix App Screen Reader Bluetooth Collaboration Save Money Backup Cybersecurity IT Technicians Document Management Hardware Nanotechnology VoIP SharePoint Public Speaking Modem Unsupported Software Storage Busienss Computing Point of Sale Hacks iPhones Wi-Fi Social Ransomware Servers Vulnerability Hotspot Physical Security Tutorials Bitcoin Downtime Multi-Factor Security Automobile Unified Communications Gadgets communications Competition How To Distributed Denial of Service Windows 8 Printer Crowdsourcing Settings Managing Stress Health Gadget Phishing Tech Term Food Productivity Remote Computing Virtual Desktop Staffing Google Docs Halloween Trending Connectivity Hiring/Firing Network Cameras IT service Networking Cables Efficiency Smart Technology Deep Learning Virus IT Consultant Regulations vulnerabilities Skype Business Growth Webcam Legal Start Menu Best Practices Holiday Chrome Charger Meetings

Latest Blog Entry

Facebook Makes Two-Factor Authentication Easier
If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the soci...
Read more...

Latest News

Book Your Domain Name


webSolutionOne Launches New Domain Registration Site

Find your perfect domain name in minutes with our name suggestion tool.  Visit www.s1host.com to get started!

 

Contact Us

Learn more about what SolutionOne can do for your business.

callphone

Call us today    214-299-8555

  facebook  twitter  linkedin Subscribe to our blog