888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Managed IT Services Privacy Cloud Network Security Malware Internet Hackers Communications User Tips Cybersecurity Tech Term Software Productivity Ransomware Backup Business Management Smartphones Outsourced IT VoIP Efficiency Microsoft Passwords IT Support Alert Business Hardware Email Productivity Data Small Business Data Recovery Browser IT Services Innovation Network Social Media Google Data Backup Windows 10 Communication Cloud Computing Mobile Device Smartphone Microsoft Office Holiday Phishing Users Collaboration Save Money Hosted Solutions Apps Data Breach Vulnerability Miscellaneous Android Saving Money App Bandwidth Twitter Access Control Internet of Things Business Continuity BDR Applications Facebook Law Enforcement Workplace Tips Blockchain Patch Management Workers Office 365 Settings Employer-Employee Relationship Personal Information Remote Monitoring Scam Excel Company Culture Cybercrime Networking Politics Wireless Government Mobile Device Management Mobile Devices Wi-Fi Computer Compliance How To Entertainment Recovery Marketing Antivirus Maintenance Password Retail Office Website Data Security Computers Education BYOD Medical IT Automation Managed IT Service Vendor Management Dark Web Managing Stress Chrome SaaS Spam Virus Information Remote Monitoring and Management Word Windows Virtual Assistant Connectivity Tech Support Cortana Bring Your Own Device Printer iPhone HaaS Printer Server Data loss Gadget Safety Help Desk Telephone System WannaCry Unified Threat Management HP Biometrics Error Streaming Media Outlook Travel Business Intelligence The Internet of Things Regulation Vulnerabilities Sales Managed Service Provider Cost Management Printers Gadgets Budget Troubleshooting Physical Security Technology Tips Hybrid Cloud Healthcare WiFi Managed IT Cleaning Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Certification HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Downloads Managed Service Live Streaming Reporting Tablet Computer Care VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Mobility Remote Support Hard Drive Paperless Office Tactics Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Upgrade Knowledge PowerPoint Gaming Console VoIPSavings Yahoo SSD Voice over Internet Protocol Proactive IT E-Commerce Remote Control IT budget Authentication Training Processors Digital Internet Explorer Analytics Hard Drives A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal GDPR Comparison IT Management Sports Video Games Google Maps Update Emergency Telephony DDoS Inventory Payment Two-factor Authentication Authorization Dongle Worker Security Cameras Apple Edge Threat IaaS Specifications Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology instant Messaging Email Management Quick Tips Remote Computing Samsung Wireless Technology 5G Wearables Money Laptop Printing Conferencing Unified Communications IBM Network Attached Storage Managed IT Services Hacker eCommerce Operating System Telecommuting Paper Competition Customer Relationship Management Server Management IP Address Online Shopping Environment Big Data Cryptocurrency Millennials Fun Ink Customer Service Mobile Office Google Drive IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram

Newsletter Sign Up