Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 203.261.2201.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 16, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Disaster Resistance IT budget Sync Windows 8 Browser Business G Suite IT Solutions Alerts Business Continuity Utility Computing IP Address Communication Motion sickness Management Experience Tablet Digital Halloween Black Market Redundancy User Error Legislation Specifications Google Calendar Managed IT services Mirgation Miscellaneous Multi-Factor Security Public Cloud Private Cloud Address Users Heating/Cooling BDR Infrastructure Migration Phone System App Going Green History Mobility Downloads Video Surveillance Server Management Hiring/Firing SharePoint Collaboration YouTube Virus Vulnerabilities Quick Tips Dark Web Company Culture Hard Drives Screen Reader Budget Patch Management Network Congestion Time Management Router Small Business Fax Server Education Google Docs Hackers Google Wallet Blockchain Lenovo Cost Management Black Friday Meetings IT Support IT Support Typing Data Breach Computing Infrastructure Drones Regulations IT Consulting Data Security Technology Servers Save Money Social Phishing Health Running Cable PC Care Machine Learning Work Station Hard Disk Drive Business Management VPN Computer Repair Law Firm IT Malware eWaste Identities IT Management IBM Emoji Hacker Service-based Business Information Technology Web Server Staffing Presentation Cooperation Hacking Alert Cables Efficiency Internet Break Fix Money Spam Leadership Government HIPAA Wireless Technology Operating System Recovery Paperless Office Disaster Big Data Recycling Smartphone Scary Stories Saving Money IT service Net Neutrality Windows Data Warehousing How To Virtual Private Network Comparison Macro Application Tutorials Customer Relationship Management Laptop Licensing Access Control Android Debate Computer Care Twitter Cache Backup Uninterrupted Power Supply Data storage IT Consultant VoIP Antivirus Windows 10 Remote Monitoring Politics Entrepreneur Office 365 Saving Time Text Messaging Identity Theft Search Customer Service Hacks Document Management Webinar Administration Mobile Device Management Bandwidth Point of Sale Tip of the Work Unified Threat Management Tracking Robot Network Battery Mobile Computing Digital Payment Electronic Medical Records Undo Windows 10 Sports Proactive IT Consultation Writing IoT Productivity IT Services Gaming Console LiFi Data Management Smart Tech Refrigeration Mobile Security Techology Best Practice Vendor Management Retail Microsoft Excel Crowdfunding Fraud Office Email Shortcut Apple Bring Your Own Device Managing Stress Trending Avoiding Downtime Congratulations Workplace Tips Cryptocurrency Notifications Data Social Networking Flexibility Social Engineering Hosted Solutions Humor Co-managed IT Network Management Star Wars Automation Consumers Cookies Enterprise Content Management Data Recovery Statistics CCTV Buisness Managed IT Outlook Display Unsupported Software Passwords Technology Laws Competition Current Events Encryption Logs communications Supercomputer Gmail User Tips Domains Augmented Reality Monitors User Internet of Things Fun Holiday End of Support Troubleshooting Healthcare Printer Disaster Recovery SaaS Computing Connectivity Law Enforcement Crowdsourcing Project Management Wires Solid State Drive Taxes Intranet Unified Communications Wireless Risk Management Hotspot Language 3D Printing Wi-Fi GPS Cleaning CrashOverride Mobile Device iPhone Automobile Unified Threat Management WiFi Hosted Solution Superfish Network Security Deep Learning Cortana Physical Security Upgrades Charger Cabling Outsourced IT Digital Signature Google Drive Firefox Processors Hardware Managed IT Service Skype Mobile Devices Business Growth Nanotechnology Hard Drive Value Alt Codes Remote Computing Marketing Settings Data Backup Chrome Mail Merge Best Available Distributed Denial of Service Content Filtering Travel Password Facebook Internet Exlporer BYOD Piracy Innovation Windows 8.1 Update Computer Accessories Work/Life Balance Business Technology Security Google Secruity Conferencing Geography Print Server Analyitcs Knowledge Programming Word Mouse Managed Service Provider Administrator PDF Telephone Systems Applications Enterprise Resource Planning Start Menu Legal Microsoft LinkedIn Ransomware Cyber Monday Business Owner Managed IT Services Virtualization Thank You Technology Tips Files Office Tips Bitcoin Best Practices Bluetooth Identity Cloud Computing People Permissions Google Analytics Tip of the Week Safety Online Currency Scheduling Smart Technology Wearable Technology Website Downtime Business Intelligence Mobile Business Computing Printing Cybercrime Productivity Save Time Training Privacy Tip of the week PowerPoint Artificial Intelligence Gadgets Botnet Development Storage High-Speed Internet IT Technicians Inbound Marketing Corporate Profile Spyware 5G Mobile Data Software as a Service Mobile Office Error 3D Smartphones Remote Support Help Desk Samsung Social Media Computers Motherboard Operations Employer-Employee Relationship Tech Support Tech Term Chatbots Cameras Scam Streaming Media Chromebook Upgrade Environment Staff Virtual Reality Mobile Technology The Internet of Things Telephony Microsoft Office Trainging Assessment CIO Personal Information Software Documents Vulnerability Software Tips Backups Memory Modem Maintenance Lithium-ion Battery Touchscreen Gadget Cybersecurity USB Public Speaking Server File Sharing Excel Cloud eBay Websites Google Maps Webcam Networking Food Firewall Two-factor Authentication Apps Computer Virtual Desktop Relocation Data Loss Compliance

      Latest Blogs

      The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube