Out of the Box Solutions Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Out of the Box Solutions is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-750-4OBS (4627) to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Tech Term Internet Privacy Cybersecurity Efficiency Browser Smartphones Communication User Tips Cloud Malware Android Productivity Hardware Microsoft Communications Managed IT services Users Mobile Device Ransomware Saving Money Network Wi-Fi Email Passwords Windows 10 Small Business Data Workplace Tips Applications Collaboration Outsourced IT Innovation Data Backup Backup Google Business Intelligence Social Media Managed IT Services Blockchain Hosted Solutions Information Mobile Devices Employer-Employee Relationship Data recovery Internet of Things Networking Business Wireless VoIp Software Marketing Business Management IT Support Artificial Intelligence Bandwidth Virtual Assistant Cost Management Analytics Cloud Computing Managed Service Wireless Charging Managed IT Service Remote Computing Patch Management Compliance Virtualization Computer VPN BDR Data Management Computers Cortana Tech Terms Save Money Gmail Hackers Connectivity Automation IT Services BYOD eCommerce Laptop Millennials Technology Tips Apps Error Processors Cables Ink SaaS Password Managing Stress Troubleshooting Tablet Twitter Authorization Digital Data loss Router Plug-In Wireless Internet Online Shopping Business Technology Streaming Media Vulnerability Machine Learning Conferencing Database Voice over Internet Protocol Government PowerPoint GDPR Environment Update Internet Explorer IT Management Excel Inventory Unified Communications Spam Websites Proactive IT Backup and Disaster Recovery Downloads Touchscreen Spyware Office Cybercrime Telecommuting Sports WannaCry Server Management e-waste G Suite Outlook Big Data Safety Threat Server Knowledge Office 365 Data Protection RAM Edge Virus Tip of the week Remote Monitoring and Management Settings Phishing Hard Drives Trends Microsoft Office 365 HP Content Filtering Tactics Storage HIPAA Comparison disposal Bring Your Own Device Profitability Printing Reporting Telephony Mobile Security Microsoft Teams Miscellaneous Antivirus User Tip Microsoft Office IT budget Data Breach SSD A.I. Access Control Document Management Telecommute Holiday Physical Security Workers Dark Web Hard Drive Specifications Value Hybrid Cloud Amazon Eliminating Downtime Dongle Paper Medical IT Lead Generation Network Attached Storage Voice over IP Operating System Company Culture Staff Analysis Battery Sales Facebook Movies Authentication Paperless Office Smartphone Gadgets Maintenance Quick Tips Regulation Disaster Recovery Alert Printers