Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What is meant by Asymmetrical protocols?

user-image
Question added by Mostafa Abdo , Senior Infrastructure and Security Architect , Devoteam
Date Posted: 2014/01/07
Aya Omar
by Aya Omar , IT Manager Assistant , AID

There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.

Tariq Ali
by Tariq Ali , Deputy Manager IT , Kohat Cement Company Limited

There are clients who request a service andthere are servers who tend to this request. Thisrelationship is called Asymmetrical protocol.

mohammed akram
by mohammed akram , Network Enginee , Digital Oasis Information Technology company

mean the relationship build by two way . mean full duplex .client and server relation ship.  client ask from server . as well as server giving the respond to client .

Muhammed Dalloul
by Muhammed Dalloul , Network And Security Support , Al-Yamamah steel

Using asymmetrical encryption in a  superimposed fashion for the purpose of ID 

control. • Means that the sender encrypts with his/her 

secret key first, followed by the encryption  with the receiver’s public key. 

 

Ahmed Mohamad Mohamad Elsherbeny
by Ahmed Mohamad Mohamad Elsherbeny , Head of team , Egypt Penetration Testers

In the context of Network Communication, here is a comparison between Symmetric Protocols and Asymmetric Protocols:

 

Symmetric Protocols:  

The protocol  involves communication between network entities. This means that each side of the communication must have the same protocol installed to operate a successful communication between both entities. Most of the protocols are symmetric.

So let us say A and B need to communicate between each other using Symmetric Protocol then A and B must have that protocol installed.

 

Asymmetric Protocol :

The protocol only operates on one side of the communication between network entities. So for the Asymmetric Protocol to operate successfully all the information required for reassembly must be contained in the fragmentation header sent with each fragment or the other side will never figure how to reassemble that protocol.

So let us say A and B need to communicate between each other using Asymmetric Protocol then only one side A or B must have that protocol installed.

 

And you guys must be careful not to mix these definitions together:

Symmetric  and Asymmetric Protocols

Symmetric  and Asymmetric Authentications

Symmetric  and Asymmetric Algorithms

 

Hope this was helpful,

Ahmad Elsherbeny

Mahmoud Mamdouh
by Mahmoud Mamdouh , Linux System Administrator (Remote position) , 2X4.ru

at CS it mean BOSS relation or father-sons relation .. which one server monitor another servers and standby if one failed it work on behalf of it .. it wast resource .. and Symmmetric better than it.

Mostafa Khamies Dakam
by Mostafa Khamies Dakam , Network Specialist , Libyan Fertilizer Company

Whenever the client and the server is not tied to the response for every request, then its Asymmetrical Protocol.

Sajjad Haider Abbasi
by Sajjad Haider Abbasi , Manager – IP Core Networks , Satcomm (Pvt) Ltd.

Asymmetrical encryption protocol has2 keys. It encrypts data with one key and it decrypts data with another key. It uses public key and private key concept. RSA is one of asymmetrical encryption protocol.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.