Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

Basically, it’s a Rule
While you’re reading this blog, turn your glance upward to the address bar. You’ll see the website’s name and the world wide web (www) at the front, but before all of that, you’ll see the protocol in the form of letters with a colon and backslashes. This indicates the way that the information you’re viewing on your webpage was sent to your device.

The two most notable website protocols to consider are HTTP and HTTPS. These stand for Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure, respectively. Both of these are used to show that a hypertext page was used to transmit the information from its source to your web browser. As you might have guessed, however, HTTPS has an additional layer of security that keeps prying eyes away from seeing the data as it’s in transit.

Why Do We Use Protocols?
To understand how protocol works, we’ll use the example of two children; one of them throws a baseball, while the other is prepared to catch a frisbee. Of course, the two are incredibly different things, which complicates the actual act of catching it. The situation is quite similar for a computer. If a device is only preparing to receive 8-bit packets whereas the data sent is in 16-bit packets, things aren’t going to work according to plan.

By thinking about it in this sense, it’s easy to see that the protocol is designed to give the device an idea of the data it’s about to receive so that it can be both sent and retrieved successfully.

How Important is Protocol for the Average User?
If you’re not the one responsible for programming or network administration within your organization, then it’s likely that you won’t need to know much about protocol. However, it doesn’t hurt to remember that you should only enter data into a web form (particularly sensitive information) if the device is using a secure connection through HTTPS. For other questions or concerns you might have about protocol, be sure to reach out to us at 203.261.2201.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Secruity Macro Disaster Resistance Website Scary Stories Google Wallet Enterprise Resource Planning Break Fix Upgrades HIPAA Disaster Recovery Education Cybersecurity Google Docs Drones Alt Codes Virus Networking Applications Intranet Physical Security Network App YouTube Augmented Reality Technology Tips Office Word Hosted Solution Best Practices Google Drive Holiday Technology Laws Android Managed IT Services Shortcut Internet Exlporer Machine Learning Outsourced IT Data Recovery IT Consulting PDF Printing Application Virtualization Files Mobile Security End of Support Virtual Private Network Business Computing Bitcoin Trainging Development GPS Blockchain Health Proactive IT Writing Facebook SaaS BDR Current Events Leadership Documents Efficiency Software as a Service Tutorials Distributed Denial of Service Unified Threat Management Hiring/Firing Cookies Mobile Technology Software Email Gadgets Chatbots Alerts Company Culture Unified Threat Management Programming IT Consultant Bandwidth Gadget User Processors Undo Internet of Things Communication Smartphones Servers Food Consultation Backup Cabling Business Management Samsung Point of Sale Recovery Best Practice VPN Computer Accessories Search Content Filtering Dark Web Data storage Private Cloud Avoiding Downtime Corporate Profile Mail Merge Google Analytics Remote Monitoring Troubleshooting Humor Server Windows 10 Microsoft Excel Analyitcs Office 365 Statistics Network Congestion Staffing Windows 8 Start Menu Mobile Device Business Growth Trending BYOD Data Breach Bluetooth Training Specifications Saving Money Print Server Knowledge Wireless Privacy Windows 8.1 Update Google Maps 3D Time Management Fraud High-Speed Internet Battery CCTV Access Control iPhone Telephone Systems Virtual Desktop Cooperation Customer Service WiFi Budget 3D Printing Mirgation Passwords Managed IT IT Support IT budget Managing Stress Tech Term Emoji Remote Support Best Available IT Management Geography User Error Recycling Environment Technology Solid State Drive Tech Support Cloud People Wi-Fi Smart Tech Remote Computing Users Smart Technology Malware Refrigeration Cleaning Project Management Artificial Intelligence Fax Server Taxes Mouse Government Hacking History Cloud Computing Mobile Information Technology Settings Net Neutrality Save Time Smartphone SharePoint Managed IT Service Crowdsourcing CIO Save Money Meetings Operating System Social Memory Deep Learning Alert Travel Microsoft Office Wireless Technology Connectivity Computing Workplace Tips Business Consumers Computer Repair Touchscreen Webcam Printer Business Intelligence Hacks Unified Communications Healthcare Data Loss Gmail IT Technicians Cache Charger Backups Language Productivity Google Calendar Address Vulnerability Lithium-ion Battery Two-factor Authentication Websites Screen Reader Chrome Encryption Paperless Office Document Management Computers Streaming Media Work Station Work/Life Balance Spam Buisness LinkedIn Sports Data Warehousing Electronic Medical Records The Internet of Things Managed Service Network Management Sync Automobile Business Continuity eBay Licensing Skype PowerPoint IT Services Inbound Marketing Error IT service Laptop Security Office Tips Supercomputer Administration Hard Disk Drive Motherboard Miscellaneous Vulnerabilities Phishing IT Support Outlook Crowdfunding Windows Lenovo Conferencing Cameras Presentation Disaster IoT User Tips Legislation Data Security Heating/Cooling Running Cable Scheduling Mobile Device Management Modem Software Tips Monitors Typing Legal Money Marketing Politics Notifications Fun Patch Management Cybercrime Going Green Entrepreneur Infrastructure VoIP Firewall Browser Business Technology Scam Data Backup Utility Computing Downtime Upgrade Phone System Co-managed IT G Suite Tablet Managed IT services Microsoft Storage Robot Gaming Console Techology Computer Care Small Business Logs Mobile Data Law Enforcement Wires Hardware Identities Staff Relocation Collaboration Big Data Saving Time Hard Drive Internet Employer-Employee Relationship Motion sickness Hackers Value Cryptocurrency How To Tip of the Work Retail Cortana Web Server LiFi Quick Tips Business Owner Debate Star Wars Administrator Black Friday Spyware Automation Tracking Identity Theft Display Identity IP Address Text Messaging Webinar Personal Information Online Currency Mobile Computing 5G Telephony Mobile Devices Law Firm IT Mobility Hard Drives Flexibility communications Halloween Cyber Monday Botnet Router Unsupported Software Customer Relationship Management Video Surveillance Bring Your Own Device Assessment Domains Server Management Tip of the week Public Cloud Computer Multi-Factor Security Comparison Ransomware Mobile Office Cost Management Safety Social Media Password Windows 10 Migration IT Solutions PC Care Apps Network Security Twitter Computing Infrastructure Black Market Compliance Digital Help Desk Downloads USB Firefox Redundancy Piracy Risk Management Digital Signature Chromebook Regulations Productivity Management Experience Vendor Management Uninterrupted Power Supply CrashOverride Congratulations IBM Hacker Managed Service Provider Virtual Reality Wearable Technology Data Management Maintenance Excel Apple Tip of the Week Public Speaking Nanotechnology Thank You Antivirus Superfish Service-based Business Google File Sharing Innovation Hosted Solutions Competition Social Engineering eWaste Permissions Operations Social Networking Enterprise Content Management Cables Data Hotspot Digital Payment

      Latest Blogs

      The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube