• Register

Data Net Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Data Net is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (760) 466-1200 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Privacy Tech Term Smartphones Malware Internet Cybersecurity Hardware Email Efficiency Microsoft Android Communications Cloud Mobile Device Data Software Innovation Google Communication Browser Mobile Devices IT Support Wi-Fi VoIp Passwords Ransomware Collaboration Network Small Business Holiday Internet of Things Data Backup Cloud Computing Users Business Management Windows 10 Managed IT services Hackers Backup Applications Social Media Data recovery Hosted Solutions Wireless IT Services Business Saving Money Outsourced IT Access Control Workplace Tips Microsoft Office Employer-Employee Relationship Blockchain Managed IT Services Word Marketing Information Smartphone Patch Management Networking Cortana Artificial Intelligence Physical Security Phishing Medical IT Router Password Save Money Wireless Charging Government Remote Computing Excel Connectivity Data Security Managed IT Service Chrome Bandwidth Virtual Assistant Mobility Virtualization Scam Data Breach VPN Apps Miscellaneous Compliance BDR Data Protection Data Management G Suite Business Intelligence Gmail Tech Terms Cost Management Computer Computers Facebook Virus Automation How To Remote Monitoring and Management Telephone System Amazon HP Knowledge Spam Battery Tech Support Trends Error IT budget Twitter instant Messaging Hybrid Cloud Outlook Cybercrime Hard Drive Healthcare e-waste Remote Support Printing Conferencing Dongle Lead Generation Certification Microsoft Teams Cleaning Document Management Antivirus Alert Vulnerability A.I. Inventory Vulnerabilities Cables Profitability Machine Learning eCommerce Tactics SaaS Laptop Backup and Disaster Recovery Processors disposal Paper Managed Service Office Company Culture Paperless Office Staff Movies Touchscreen Law Enforcement IT Management Telecommuting Mobile Security Voice over Internet Protocol Eliminating Downtime Sales Online Shopping Apple GDPR User Tip Hard Drives Spyware Personal Information Managing Stress Server Management Office 365 Value Ink Analytics Content Filtering Training Congratulations Botnet Maintenance Plug-In Digital Websites Server Help Desk Travel Microsoft Office 365 Operating System BYOD Tablet Telecommute Settings iPhone Streaming Media Storage SSD E-Commerce Troubleshooting User Security Telephony Website PowerPoint WannaCry Security Cameras Gadgets WhatsApp Remote Monitoring Internet Explorer Proactive IT Comparison Safety Business Continuity Education Unified Communications Authentication Workers News Wireless Internet Data loss Licensing Downloads Dark Web Tip of the week Payment Bring Your Own Device Update Business Technology Voice over IP Database Sports Reporting Big Data Technology Tips HIPAA Wearables Environment Retail Threat Edge Specifications Upgrade Live Streaming RAM Authorization File Sharing Network Attached Storage Millennials WiFi Analysis Quick Tips Disaster Recovery Thank You Cryptocurrency Printers Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123