In this article I describe the SSH Secure shell in computer network for CCNA exam. SSH Secure shell is related to application layer of TCP/IP Suite model. The SSH Secure shell Protocol provide to manage and configure the networking devices on the computer network . SSH Secure shell Protocol allow to take the remote and management of different networking devices over the TCP/IP network. Routing and Routed Protocols provides the connectivity between different networks for data packets flow from one network to another network. A standard routing table is maintained by the routers for data packet flow between different networks.
Before going to learn about SSH Secure shell we need to remember the OSI suite and TCP/IP suite model. There are many manufacturer of computer machine in the market. Initially when computers became single user public computer. The computers communicate with only same brand machines. It happens because there was no any fix standard for data transfer between different devices. It is very difficult to make communication with each other when the hardware are of different brands or company. In this article I describe the some basic part of OSI reference layer and TCP/IP Suite model basic concepts in networking with the SSH Secure shell.
OSI reference model basic concepts
OSI reference model in computer network followed by various vendors to overcome the compatibility problem. After implementation of OSI reference model in computer network, equality maintains by all manufacturer. In 1970 the Open Systems Interconnection (OSI) reference model was created by the International Organization for Standardization (ISO). The OSI model was meant to create inter-operable network with different manufactured devices. In this article I describe some layered approach of TCP/IP Suite model basic concepts in computer network. Before understanding the TCP/IP Suite model basic concepts it is necessary to know about the 7 layers of OSI reference model because the basic work of each layer is described in the OSI reference model. You can read the full article related to OSI reference model in computer networking here.
Importance of OSI reference model for SSH Secure shell
Before going to know about the SSH Secure shell. It is necessary to know the function of application layer in OSI model and TCP/IP model. Initially not only hardware but software also not supported for work the different computer brand. It became very difficult for all computer users to working without implementation of OSI reference model in computer network. It is necessary then to make some common protocols for all vendors of computer. Before implementation of OSI reference model in computer network, all vendors implements their own protocols on computer hardware and software.
In networking OSI reference model became helpful. OSI reference model describes the flow of data between nodes in any network. Data from one computer application to another computer application transfer by following some common protocols. The OSI reference layer also become beneficial for troubleshooting the network problems. TCP/IP and Cisco three layered hierarchical model of Cisco became more helpful alongside the OSI reference model.
The Layered Approach in computer network for SSH Secure shell
The Layered approach was the best way to make equality for all computer devices. Layers are not physical but following some protocols. Protocols are for connectivity, connections, data transfer and more. All manufacturer begin to follow the layered approach for OSI reference model in computer network. The OSI reference model change in TCP/IP reference model and later on Cisco three layered hierarchical model. OSI layer architecture have 7 layers. TCP/IP reference model convert these 7 layers into only four layers. After that Cisco three layered hierarchical model converts these 7 layers into three layers. Some layers combined to work in a single layer.
OSI is acronym for open system interconnection. The OSI is a logical reference OSI reference model in computer network. OSI model helps for data flow between different devices and operating systems. All manufacturer used their own architecture before invention of OSI reference model. It was very difficult to establish data communication between different devices. To overcome this problem international organization for standardization (ISO) created the open systems interconnection (OSI) reference model. OSI reference model make data flow possible between different operating system, devices and hardware. Later the OSI model adopted by Cisco as Cisco three layered hierarchical model.
Structure of OSI reference model related to SSH Secure shell
OSI reference model in computer network consist of 7 layers. These 7 layers further divided into two groups. First 3 layers works for application communication and remaining 4 layers works for data flow. Application, presentation and session layers define the application communication. Transport, network, data link and physical layers define the data flow. Networking protocols works only on last four layers.
TCP/IP Suite model basic concepts for SSH Secure shell
TCP/IP is acronym for Transmission Control Protocol/Internet Protocol (TCP/IP suite model). In this section of the article I describe about TCP/IP suite model basic concepts in detail. TCP/IP suite model is a reference model like OSI layers. Instead of 7 layers of OSI reference model. TCP/IP suite model consist only four layer. All seven layers are merged into four layers only. TCP/IP suite model was designed and implemented by Department of Defence (DoD). TCP/IP developed to preserve data integrity. The main purpose to develop the TCP/IP is to provide security in the network. A lots of protocols works on each layer to provide a secure network.
It is necessary to understood the protocols used in TCP/IP Suite model basic concepts. IP addressing play an important role in TCP/IP Suite model basic concepts. By using the IP address and subnet masking broadcast domain breaks. It will improve the performance of the network. Breaking broadcast domain increase the data flow speed. Here IP stands for IPV4 only. We ignore the IPV6 for some time in this article. It will make it easy to understand the TCP/IP Suite model basic concepts.
A snap of TCP/IP Suite model basic concepts
In the decade of 1970’s TCP/IP suite model developed by DoD. In the initial stage TCP/IP suite model divided into two segments TCP and IP. Later its name registered with combined name of TCP and IP like TCP/IP model. ARPA, the Advanced Research Projects Agency of DoD officially authorised to use TCP/IP suite model. TCP/IP model was working well so it was adopted by many organisations. In today scenario it is mostly using reference model for networking. Internet is the best example of using TCP/IP.
Process or Application layer of DoD model in TCP/IP Suite model
This is the first layer of TCP/IP of DoD model. It is combination of top three layers of OSI reference model. The functions of Application layer, presentation layer and session layer in OSI model works in single layer process layer. This layer supports the point to point communication and controls the user interface. The data encryption and decryption also done at this layer. Example of some protocols functions at this layer are Telnet, FTP, LPD, TFTP, SMTP.
Transport layer of DoD model in TCP/IP Suite model
Transport layer of TCP/IP is same as the Transport layer of OSI reference model. It supports the TCP and UDP protocol. This protocol converts the main data segment into packets and transport to the internet layer. The responsibility of Transport layer is to combine the segments and built the data. The data should be reconstruct in its real form. Transport layer is also responsible for creating end-to-end communication between sender and receiver. This layer ensure the delivery of segment in sequence at the receiving device. This property maintains the data integrity.
Internet layer of DoD model in TCP/IP Suite model
Internet layer of TCP/IP is similar to the network layer of OSI reference model. Routing protocols functions on Internet layer of TCP/IP model. Addressing and filtering of packets is main responsibility of Internet layer of TCP/IP model. This layer provides the transmission of packet in the whole network. Some example of protocols functions on internet layer are ICMP, ARP and IP.
Link layer of DoD model in TCP/IP Suite model
Link layer is the least layer of TCP/IP. Basically link layer is combination of data link and physical layer of OSI reference model. Link layer is also known as Network Access layer. It works on MAC address based data transmission. Link layer handles the frame and bits. It receive the bits and constructs frame from merging bits in a sequence. In case of any bit is missing this layer request to re transmit the bits. Ethernet, FDDI, WAP etc functions on this layer. There is no any preset specification for link layer. Link layer functions on any type of existing media.
SSH Secure Shell explained in breief
SSH is abbreviation of Secure Shell. SSH Secure shell is an application layer protocol in TCP/IP model. The SSH Secure shell provides the facility to configure and monitor the remoter servers over the TCP/IP network. Secure shell SSH uses multiple encryption technologies to provide secure connection between the user and remote server. Multiple authentication techniques used by Secure shell. SSH protocol is a remote administration protocol. SSH provides a mechanism for authenticating a remote user with secure username and password. Protocol SSH allow a user to transfer the input from the client to the host.
Symmetric Encryption, Asymmetric Encryption, and Hash technique used for encryption on Secure Shell SSH protocol. SSH uses different type of data manipulation for making secure connection between client and server. SSH works on port number 22 in a TCP/IP network or internet.
Symmetrical Encryption technique for SSH
The encryption and decryption of data is depending on the encryption scheme. Symmetrical encryption is a kind of encryption scheme which allow data encryption and decryption. In symmetrical encryption a common key is used by the client and server. The key uses to encryption and decryption message of participants. Any client or server can communicate with each other securely by using the common key. Only one single key can be used for all operations of Secure Shell protocol. The secret key generated by key exchange algorithm process. By exchange algorithm both client and server get the common key. Symmetrical encryption is two-way data transferring technique.
Secure Shell protocolconfigured to use different symmetrical cipher systems. The Secure Shell SSH supported by both server and client. Secure Shell supports Windows and Linux environment. Secret key can be generated by using putty software in windows.
Asymmetrical Encryption technique for SSH
Asymmetrical encryption uses to send data in a single direction either client to server or reverse. In asymmetrical encryption two associated keys required for encryption and decryption. These keys are the private key and public key. Both private key and public key are paired with each other. Public key use to encryption of data. Private key use to decryption of data. It means public key cannot be used for decryption of data. This is why asymmetrical encryption is one-way data sending scheme.
The private key never shared with any other client. This means only private key holder can decrypt the data. This feature provides a high-level security feature to SSH protocol. Public key distributed to any client to make SSH connection with the server. SSH key pairs used for authentication of client and server.
Hashing Encryption technique for SSH
Hashing technique for SSH protocol Cryptographic hashing is another form of data manipulation uses with Secure Shell SSH. The Hashing method uses to creating a brief “signature” or summary of information. Same hashing function used for encryption and decryption of data in Secure Shell protocol.
I hope you found this article helpful. For any query or suggestion on this article contact us or drop a comment below. your suggestions are always welcome by us.
Hello I am so glad I found your webpage, I really found you by accident,
while I was browsing on Digg for something else, Nonetheless I am here
now and would just like to say thanks a lot for a incredible post and a all round entertaining blog (I also love
the theme/design), I don’t have time to browse it all
at the moment but I have bookmarked it and also added your RSS
feeds, so when I have time I will be back to read much more,
Please do keep up the awesome job.
Thanks very interesting blog!