Out of the Box Solutions Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Out of the Box Solutions is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-750-4OBS (4627) to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Productivity Tech Term Privacy Smartphones Internet Efficiency Hardware Microsoft Cybersecurity Communication Malware Data Innovation Mobile Device Email Browser Android IT Support Mobile Devices Cloud Communications Collaboration Ransomware Google Passwords Network Small Business Windows 10 Wi-Fi Data recovery Internet of Things IT Services Business Wireless Applications Users Holiday Backup Business Management Saving Money Managed IT services Data Backup Software Marketing Information Networking Hackers Outsourced IT Social Media Managed IT Services Workplace Tips Cloud Computing Business Intelligence Employer-Employee Relationship Blockchain Hosted Solutions VoIp Computers Remote Monitoring and Management Tech Terms Save Money Microsoft Office Access Control Connectivity Automation Managed IT Service Medical IT Facebook Remote Computing Smartphone Patch Management Apps Artificial Intelligence Computer Bandwidth Virtual Assistant Password Cost Management Analytics Managed Service Mobility Wireless Charging Office 365 Data Security Cortana Compliance Virtualization VPN BDR Gmail G Suite Data Management Business Continuity Settings Hard Drives Trends Microsoft Office 365 HP Tactics Voice over IP Gadgets Storage E-Commerce HIPAA disposal Bring Your Own Device Sales Profitability Reporting Word Mobile Security Microsoft Teams Millennials Miscellaneous Antivirus Printing Upgrade IT budget SSD A.I. Document Management Telecommute Dark Web Payment Hard Drive Value Hybrid Cloud Tablet Amazon Eliminating Downtime Physical Security Paper Conferencing Wearables Lead Generation Network Attached Storage Operating System Company Culture Business Technology Staff Dongle Analysis Certification Battery Movies Authentication Paperless Office Maintenance Technology Tips Error instant Messaging Processors Cables Excel BYOD eCommerce Laptop Ink Office SaaS Healthcare Managing Stress Troubleshooting Twitter Telecommuting Authorization Digital Data loss Router Streaming Media Tip of the week Vulnerabilities Vulnerability Machine Learning Database Voice over Internet Protocol Knowledge Plug-In Wireless Internet Online Shopping Government PowerPoint Content Filtering GDPR Environment Phishing Update Training IT Management Inventory Unified Communications Spam Websites Internet Explorer Comparison Backup and Disaster Recovery Downloads User Tip Touchscreen Spyware Cybercrime Telephony Proactive IT Help Desk Sports Personal Information WannaCry Server Management e-waste Data Breach Outlook Big Data Specifications Security Cameras Server Data Protection RAM Workers Edge Virus Safety Threat Alert Printers Quick Tips Cryptocurrency Regulation Disaster Recovery