Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Skip to main content

Handshake protocol

Handshake protocol

(also handshaking protocol, handshaking)

Handshake protocol definition

A handshake protocol can create steady connections between unique devices, systems, or networks and is commonly utilized by organizations and people to establish a connection between a server and a consumer.

For example, an organization may use a handshake protocol to provide personnel with a steady way to get the right of entry to its main server.

In addition, a handshake protocol is used to ensure that the communication channel established between the server and the customer is steady and reliable. This results in a number of control mechanisms that prevent users who aren’t authorized to access the network, making the connection even more secure.

This protocol additionally gives rules that devices need to comply with whilst sharing data.

See also: TCP handshake, 3-way handshake

Handshake protocol applications

Transmission Control Protocol (TCP). TCP uses the handshake protocol to establish reliable and secure communication between two devices. It synchronizes the message exchange procedure between a server and a client.

Transport Layer Security (TLS). TLS connections require multiple agreements between servers and customers to create stable communication between them. It makes use of the handshake protocol to define the safety features for a specific connection.

Simple Mail Transfer Protocol (SMTP). SMTP uses the handshake protocol to set up a TCP connection between two parties. Also, it uses it to negotiate other communication features like max message size and the encryption protocol that will be used.

Dial-up internet access: Dial-up internet access makes use of the handshake protocol to outline the communication between two parties, find appropriate modulation, connection optimization, and disable echo suppression.

Further reading

Ultimate digital security