Internet, Networking, & Security Home Networking 32 32 people found this article helpful Understanding Symmetric and Asymmetric Networking Technology Most home routers use asymmetric technology by Bradley Mitchell Writer An MIT graduate who brings years of technical experience to articles on SEO, computers, and wireless networking. our editorial process LinkedIn Bradley Mitchell Updated on November 04, 2019 Dong Wenjie / Getty Images Home Networking The Wireless Connection Routers & Firewalls Network Hubs ISP Broadband Ethernet Installing & Upgrading Wi-Fi & Wireless Tweet Share Email In a symmetric computer network, all devices transmit and receive data at equal rates. Asymmetric systems support more bandwidth in one direction than the other. Reasons for Choosing Asymmetric Over Symmetric Tech With the rise of streaming movies and television shows online, the typical home router downloads more data than a family is likely to upload. Most home routers can handle this discrepancy between the amount of downloaded data and uploaded data. In many cases, the cable or satellite company provides higher download speeds than upload speeds for the same reason. For example, Digital Subscriber Line (DSL) technology exists in both symmetric and asymmetric forms. Asymmetric DSL (ADSL) offers more bandwidth for downloads by sacrificing bandwidth available for uploads. Internet services for home use usually support ADSL because internet users tend to download more data than they upload. Symmetric DSL supports equal bandwidth in both directions. Business networks, which regularly send and receive data, use SDSL more often. Symmetric vs. Asymmetric in Networking Symmetry and asymmetry also apply to network design in more general ways. Symmetric network design gives all devices equal access to resources. Asymmetric networks segregate access to resources unequally. For example, pure P2P systems that don't use centralized servers are symmetric. Other P2P networks are asymmetric. In network security, both symmetric and asymmetric forms of encryption exist. Symmetric encryption systems share the same encryption keys between both ends of the communication. Asymmetric encryption systems use different encryption keys on each communication endpoint. Some of these keys might be public. Others may be private.