Out of the Box Solutions Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Out of the Box Solutions is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-750-4OBS (4627) to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Privacy Communication Malware Data Microsoft Efficiency Tech Term Google Internet Hardware Smartphones Mobile Device Computer Innovation Ransomware Windows 10 IT Support Hackers Users Email Cybersecurity Android Mobile Devices Business Managed IT Services Business Management Network Passwords Small Business Browser Software Communications Cloud Applications Outsourced IT Collaboration Workplace Tips IT Services Wi-Fi Hosted Solutions Apps Backup Bandwidth Wireless Saving Money Holiday Social Media Data Backup Smartphone Cloud Computing Managed IT services Employer-Employee Relationship Information Data recovery Internet of Things VoIp Save Money Miscellaneous Microsoft Office Upgrade Laptop Business Intelligence Gmail Managed Service Networking Blockchain Marketing Gadgets Value Computers Company Culture Facebook Managed IT Service Tech Terms Remote Monitoring and Management Remote Computing Cost Management Patch Management Automation Voice over Internet Protocol Office Access Control Paperless Office Artificial Intelligence Office 365 Medical IT Virtual Assistant Password Cortana Analytics BDR Wireless Charging G Suite Chrome RAM Telephony Healthcare Virtualization Mobility Processor VPN Data Security Compliance Connectivity Data Management Net Neutrality Dongle Proactive IT Paper Settings Help Desk Operating System Touchscreen HP Cryptocurrency Taskbar Maintenance Outlook Movies HIPAA Personal Information Tablet Hard Disk Drive Technology Tips Security Cameras Business Technology Cables Human Resources Antivirus Conferencing Benchmarks Ink Business Continuity IT budget Microsoft Office 365 Managing Stress Document Management Windows 7 Telecommute National Security Router Profitability Physical Security Twitter Storage Hard Drive E-Commerce Excel Video Reporting Streaming Media Lead Generation Word Network Attached Storage Database Employee-Employer Relationship Staff Government PowerPoint Battery Telecommuting Environment Time Management Windows Websites Amazon Internet Explorer eCommerce Eliminating Downtime Tip of the week Inventory Dark Web Unified Communications Processors Payment Knowledge Customer Service Electronic Health Records Content Filtering Backup and Disaster Recovery Downloads Wearables Phishing Cybercrime Analysis Sports Certification e-waste Authentication Digital Data loss Comparison Updates Safety Threat Online Shopping BYOD User Tip Data Protection Error Vulnerability instant Messaging Machine Learning OneNote Troubleshooting Health Hard Drives SaaS Trends Data Breach Employees Tactics IT Management Workers disposal Authorization Bring Your Own Device Chrome OS Spam Specifications Plug-In Printing Wireless Internet Mobile Security Microsoft Teams Spyware Vulnerabilities Voice over IP Windows Server 2008 R2 Update Big Data SSD GDPR A.I. WannaCry Server Management Sales Solid State Drive Server Training Millennials Hybrid Cloud Edge Virus Display Regulation Disaster Recovery Risk Management Printers Alert Quick Tips