Out of the Box Solutions Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Out of the Box Solutions is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-750-4OBS (4627) to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 23 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Tech Term Network Security Cybersecurity Privacy Smartphones Malware Hardware Internet User Tips Data Managed IT services Microsoft Ransomware Passwords Android Cloud Communications Communication Backup Saving Money Social Media Business Management Productivity Collaboration Email Employer-Employee Relationship Innovation Efficiency Google Business Intelligence Small Business Browser Network Blockchain Hosted Solutions IT Support Wi-Fi Applications Mobile Devices Managed IT Service Business Tech Terms Users Outsourced IT Save Money Networking Wireless Hackers Patch Management Automation Remote Computing Computer Artificial Intelligence Workplace Tips Virtual Assistant Cost Management Analytics Cloud Computing Bandwidth Wireless Charging Cortana Data Backup Mobile Device Virtualization Gmail Windows 10 Compliance Software VPN VoIp Marketing BDR Data Management IT Services Information Computers Internet of Things Data recovery Reporting Mobile Security Microsoft Teams Miscellaneous Antivirus Printing Tablet IT budget SSD A.I. Conferencing Access Control Document Management Telecommute Business Technology Microsoft Office Connectivity Dark Web Hard Drive Value Hybrid Cloud Amazon Holiday Physical Security Excel Medical IT Lead Generation Network Attached Storage Operating System Company Culture Managed IT Services Staff Dongle Paper Battery Facebook Movies Office Authentication Paperless Office Smartphone Maintenance Analysis Technology Tips Apps Error Processors Cables Telecommuting eCommerce Laptop Knowledge Office 365 SaaS Password Managing Stress Tip of the week Ink Twitter Content Filtering Authorization Digital Data loss Router Phishing Managed Service Streaming Media Comparison Vulnerability Machine Learning Database Voice over Internet Protocol Plug-In Online Shopping Telephony GDPR Environment User Tip Government PowerPoint IT Management Inventory Unified Communications Spam Websites Internet Explorer Data Breach Backup and Disaster Recovery Downloads Specifications Touchscreen Spyware Cybercrime Workers Proactive IT Voice over IP WannaCry Server Management e-waste G Suite Big Data Sports Server Data Protection RAM Gadgets Edge Virus Safety Threat Sales Hard Drives Trends Microsoft Office 365 HP Tactics Millennials Remote Monitoring and Management Settings Storage HIPAA disposal Bring Your Own Device Alert Printers Troubleshooting Quick Tips Regulation Disaster Recovery