SSH Secure shell

In this article I describe the SSH Secure shell in computer network for CCNA exam. SSH Secure shell is related to application layer of TCP/IP Suite model. The SSH Secure shell Protocol provide to manage and configure the networking devices on the computer network . SSH Secure shell Protocol allow to take the remote and management of different networking devices over the TCP/IP network. Routing and Routed Protocols provides the connectivity between different networks for data packets flow from one network to another network. A standard routing table is maintained by the routers for data packet flow between different networks.

Before going to learn about SSH Secure shell we need to remember the OSI suite and TCP/IP suite model. There are many manufacturer of computer machine in the market. Initially when computers became single user public computer. The computers communicate with only same brand machines. It happens because there was no any fix standard for data transfer between different devices. It is very difficult to make communication with each other when the hardware are of different brands or company. In this article I describe the some basic part of  OSI reference layer and TCP/IP Suite model basic concepts in networking with the SSH Secure shell.

OSI reference model basic concepts

OSI reference model in computer network followed by various vendors to overcome the compatibility problem. After implementation of OSI reference model in computer network, equality maintains by all manufacturer. In 1970 the Open Systems Interconnection (OSI) reference model was created by the International Organization for Standardization (ISO). The OSI model was meant to create inter-operable network with different manufactured devices. In this article I describe some layered approach of TCP/IP Suite model basic concepts in computer network. Before understanding the TCP/IP Suite model basic concepts it is necessary to know about the 7 layers of OSI reference model because the basic work of each layer is described in the OSI reference model.  You can read the full article related to OSI reference model in computer networking here.

Importance of OSI reference model for SSH Secure shell

Before going to know about the SSH Secure shell. It is necessary to know the function of application layer in OSI model and TCP/IP model. Initially not only hardware but software also not supported for work the different computer brand. It became very difficult for all computer users to working without implementation of OSI reference model in computer network. It is necessary then to make some common protocols for all vendors of computer. Before implementation of OSI reference model in computer network, all vendors implements their own protocols on computer hardware and software.

In networking OSI reference model became helpful. OSI reference model describes the flow of data between nodes in any network. Data from one computer application to another computer application transfer by following some common protocols. The OSI reference layer also become beneficial for troubleshooting the network problems. TCP/IP and Cisco three layered hierarchical model of Cisco became more helpful alongside the OSI reference model.

You may also like to read --  MGCP Media Gateway Control Protocol

The Layered Approach in computer network for SSH Secure shell

The Layered approach was the best way to make equality for all computer devices. Layers are not physical but following some protocols. Protocols are for connectivity, connections, data transfer and more. All manufacturer begin to follow the layered approach for OSI reference model in computer network. The OSI reference model change in TCP/IP reference model and later on Cisco three layered hierarchical modelOSI layer architecture have 7 layers. TCP/IP reference model convert these 7 layers into only four layers. After that Cisco three layered hierarchical model converts these 7 layers into three layers. Some layers combined to work in a single layer.

OSI is acronym for open system interconnection. The OSI is a logical reference OSI reference model in computer network. OSI model helps for data flow between different devices and operating systems. All manufacturer used their own architecture before invention of OSI reference model. It was very difficult to establish data communication between different devices. To overcome this problem international organization for standardization (ISO) created the open systems interconnection (OSI) reference model. OSI reference model make data flow possible between different operating system, devices and hardware. Later the OSI model adopted by Cisco as Cisco three layered hierarchical model.

Structure of OSI reference model related to SSH Secure shell

OSI reference model in computer network consist of 7 layers. These 7 layers further divided into two groups. First 3 layers works for application communication and remaining 4 layers works for data flow. Application, presentation and session layers define the application communication. Transport, network, data link and physical layers define the data flow. Networking protocols works only on last four layers.

TCP/IP Suite model basic concepts for SSH Secure shell

TCP/IP is acronym for Transmission Control Protocol/Internet Protocol (TCP/IP suite model). In this section of the article I describe about TCP/IP suite model basic concepts in detail. TCP/IP suite model is a reference model like OSI layers. Instead of 7 layers of OSI reference model. TCP/IP suite model consist only four layer. All seven layers are merged into four layers only. TCP/IP suite model was designed and implemented by Department of Defence (DoD). TCP/IP developed to preserve data integrity. The main purpose to develop the TCP/IP is to provide security in the network. A lots of protocols works on each layer to provide a secure network.

It is necessary to understood the protocols used in TCP/IP Suite model basic conceptsIP addressing play an important role in TCP/IP Suite model basic concepts. By using the IP address and subnet masking broadcast domain breaks. It will improve the performance of the network. Breaking broadcast domain increase the data flow speed. Here IP stands for IPV4 only. We ignore the IPV6 for some time in this article. It will make it easy to understand the TCP/IP Suite model basic concepts.

A snap of TCP/IP Suite model basic concepts

In the decade of 1970’s TCP/IP suite model developed by DoD. In the initial stage TCP/IP suite model divided into two segments TCP and IP. Later its name registered with combined name of TCP and IP like TCP/IP modelARPA, the Advanced Research Projects Agency of DoD officially authorised to use TCP/IP suite model. TCP/IP model was working well so it was adopted by many organisations. In today scenario it is mostly using reference model for networking. Internet is the best example of using TCP/IP.

You may also like to read --  MCQ for TCP IP set 4

Process or Application layer of DoD model in TCP/IP Suite model

This is the first layer of TCP/IP of DoD model. It is combination of top three layers of OSI reference model. The functions of Application layer, presentation layer and session layer in OSI model works in single layer process layer. This layer supports the point to point communication and controls the user interface. The data encryption and decryption also done at this layer. Example of some protocols functions at this layer are TelnetFTP, LPD, TFTP, SMTP.

Transport layer of DoD model in TCP/IP Suite model

Transport layer of TCP/IP is same as the Transport layer of OSI reference model. It supports the TCP and UDP protocol. This protocol converts the main data segment into packets and transport to the internet layer. The responsibility of Transport layer is to combine the segments and built the data. The data should be reconstruct in its real form. Transport layer is also responsible for creating end-to-end communication between sender and receiver. This layer ensure the delivery of segment in sequence at the receiving device. This property maintains the data integrity.

Internet layer of DoD model in TCP/IP Suite model

Internet layer of TCP/IP is similar to the network layer of OSI reference modelRouting protocols functions on Internet layer of TCP/IP model. Addressing and filtering of packets is main responsibility of Internet layer of TCP/IP model. This layer provides the transmission of packet in the whole network. Some example of protocols functions on internet layer are ICMPARP and IP.

Link layer of DoD model in TCP/IP Suite model

Link layer is the least layer of TCP/IP. Basically link layer is combination of data link and physical layer of OSI reference model. Link layer is also known as Network Access layer. It works on MAC address based data transmission. Link layer handles the frame and bits. It receive the bits and constructs frame from merging bits in a sequence. In case of any bit is missing this layer request to re transmit the bits. EthernetFDDIWAP etc functions on this layer. There is no any preset specification for link layer. Link layer functions on any type of existing media.

SSH Secure Shell explained in breief

SSH is abbreviation of Secure Shell. SSH Secure shell is an application layer protocol in TCP/IP model. The SSH Secure shell provides the facility to configure and monitor the remoter servers over the TCP/IP network. Secure shell SSH uses multiple encryption technologies to provide secure connection between the user and remote server. Multiple authentication techniques used by Secure shell. SSH protocol is a remote administration protocol. SSH provides a mechanism for authenticating a remote user with secure username and password. Protocol SSH allow a user to transfer the input from the client to the host.

ssh secure shell , ccna , ccna tutorials

Symmetric Encryption, Asymmetric Encryption, and Hash technique used for encryption on Secure Shell SSH protocol. SSH uses different type of data manipulation for making secure connection between client and server. SSH works on port number 22 in a TCP/IP network or internet.

You may also like to read --  NNTP Network News Transfer Protocol

Symmetrical Encryption technique for SSH

The encryption and decryption of data is depending on the encryption scheme. Symmetrical encryption is a kind of encryption scheme which allow data encryption and decryption. In symmetrical encryption a common key is used by the client and server. The key uses to encryption and decryption message of participants. Any client or server can communicate with each other securely by using the common key. Only one single key can be used for all operations of Secure Shell protocol. The secret key generated by key exchange algorithm process. By exchange algorithm both client and server get the common key. Symmetrical encryption is two-way data transferring technique.

ssh secure shell , ccna , ccna tutorials

Secure Shell protocolconfigured to use different symmetrical cipher systems. The Secure Shell SSH supported by both server and client. Secure Shell supports Windows and Linux environment. Secret key can be generated by using putty software in windows.

Asymmetrical Encryption technique for SSH

Asymmetrical encryption uses to send data in a single direction either client to server or reverse. In asymmetrical encryption two associated keys required for encryption and decryption. These keys are the private key and public key. Both private key and public key are paired with each other. Public key use to encryption of data. Private key use to decryption of data. It means public key cannot be used for decryption of data. This is why asymmetrical encryption is one-way data sending scheme.

ssh secure shell , ccna , ccna tutorials

The private key never shared with any other client. This means only private key holder can decrypt the data. This feature provides a high-level security feature to SSH protocol. Public key distributed to any client to make SSH connection with the server. SSH key pairs used for authentication of client and server.   

Hashing Encryption technique for SSH

Hashing technique for SSH protocol Cryptographic hashing is another form of data manipulation uses with Secure Shell SSH. The Hashing method uses to creating a brief “signature” or summary of information. Same hashing function used for encryption and decryption of data in Secure Shell protocol.

I hope you found this article helpful. For any query or suggestion on this article contact us or drop a comment below. your suggestions are always welcome by us.

Share this article in your social circle :)
, ,

2 thoughts on “SSH Secure shell

  1. Hello I am so glad I found your webpage, I really found you by accident,
    while I was browsing on Digg for something else, Nonetheless I am here
    now and would just like to say thanks a lot for a incredible post and a all round entertaining blog (I also love
    the theme/design), I don’t have time to browse it all
    at the moment but I have bookmarked it and also added your RSS
    feeds, so when I have time I will be back to read much more,
    Please do keep up the awesome job.

Leave a Reply

Your email address will not be published. Required fields are marked *